<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Windows Privilege Escalation on rchitect</title><link>https://www.rchitect.in/categories/windows-privilege-escalation/</link><description>Recent content in Windows Privilege Escalation on rchitect</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 09 Mar 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://www.rchitect.in/categories/windows-privilege-escalation/index.xml" rel="self" type="application/rss+xml"/><item><title>SeImpersonatePrivilege privilege escalation using Juicy Potato</title><link>https://www.rchitect.in/posts/juicy-potato/</link><pubDate>Wed, 09 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/juicy-potato/</guid><description>&lt;h1 id="exploiting-seimpersonateprivilege-using-juicypotato-for-privilege-escalation"&gt;
 Exploiting &amp;lsquo;&amp;lsquo;SeImpersonatePrivilege&amp;rsquo; using Juicypotato for privilege escalation
 &lt;a class="heading-link" href="#exploiting-seimpersonateprivilege-using-juicypotato-for-privilege-escalation"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;Lets take a sceanrio we have initail reverse shell or nomral user shell which requires to be elvated as Administrator.Checking the Privilege of cuurent user we have noticed &amp;ldquo;SeImpersonatePrivilege&amp;rdquo; is enabled.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name Description State 
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token Disabled
SeIncreaseQuotaPrivilege Adjust memory quotas for a process Disabled
SeShutdownPrivilege Shut down the system Disabled
SeAuditPrivilege Generate security audits Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled 
SeUndockPrivilege Remove computer from docking station Disabled
SeImpersonatePrivilege Impersonate a client after authentication Enabled 
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
SeTimeZonePrivilege Change the time zone Disabled
PS C:\Windows\SysWOW64\inetsrv&amp;gt; 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The below one privilege can be exploited using the [Juicypotato](&lt;a href="https://github.com/ohpe/juicy-potato/releases/tag/v0.1" class="external-link" target="_blank" rel="noopener"&gt;Release Fresh potatoes · ohpe/juicy-potato · GitHub&lt;/a&gt;) for most of the windows machine&lt;/p&gt;</description></item></channel></rss>