You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md
+35Lines changed: 35 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,7 @@ Operational notes:
42
42
- RoguePotato requires an OXID resolver reachable on TCP/135. If egress is blocked, use a redirector/port-forwarder (see example below). Older builds needed the -f flag.
43
43
- EfsPotato/SharpEfsPotato abuse MS-EFSR; if one pipe is blocked, try alternative pipes (lsarpc, efsrpc, samr, lsass, netlogon).
44
44
- Error 0x6d3 during RpcBindingSetAuthInfo typically indicates an unknown/unsupported RPC authentication service; try a different pipe/transport or ensure the target service is running.
45
+
- “Kitchen-sink” forks such as DeadPotato bundle extra payload modules (Mimikatz/SharpHound/Defender off) which touch disk; expect higher EDR detection compared to the slim originals.
45
46
46
47
## Quick Demo
47
48
@@ -188,6 +189,39 @@ SigmaPotato adds modern niceties like in-memory execution via .NET reflection an
- Built-in reverse shell flag `--revshell` and removal of the 1024-char PowerShell limit so you can fire long AMSI-bypassing payloads in one go.
194
+
- Reflection-friendly syntax (`[SigmaPotato]::Main()`), plus a rudimentary AV evasion trick via `VirtualAllocExNuma()` to throw off simple heuristics.
195
+
- Separate `SigmaPotatoCore.exe` compiled against .NET 2.0 for PowerShell Core environments.
196
+
197
+
### DeadPotato (2024 GodPotato rework with modules)
198
+
199
+
DeadPotato keeps the GodPotato OXID/DCOM impersonation chain but bakes in post-exploitation helpers so operators can immediately take SYSTEM and perform persistence/collection without additional tooling.
200
+
201
+
Common modules (all require SeImpersonatePrivilege):
202
+
203
+
- `-cmd "<cmd>"` — spawn arbitrary command as SYSTEM.
204
+
- `-rev <ip:port>` — quick reverse shell.
205
+
- `-newadmin user:pass` — create a local admin for persistence.
206
+
- `-mimi sam|lsa|all` — drop and run Mimikatz to dump credentials (touches disk, noisy).
207
+
- `-sharphound` — run SharpHound collection as SYSTEM.
- [Check Point Research – Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation](https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/)
240
+
- [DeadPotato – GodPotato rework with built-in post-ex modules](https://github.com/lypd0/DeadPotato)
0 commit comments