Skip to content

A centralized list of the various Potato Windows exploits.

Notifications You must be signed in to change notification settings

AtvikSecurity/CentralizedPotatoes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 

Repository files navigation

CentralizedPotatoes

This repository attempts to centralize all of the various Potato exploits. Feel free to open a PR and update the README if you wish to add another.

The "potato" family of privilege escalation attacks on Windows was started with the introduction of Hot Potato in 2016. These attacks typically exploit authentication mechanisms, credentials, and services with impersonation privileges to elevate from a service account to system level access.

Almost every one of the potatoes target a different component of Windows to take advantage of the π‘†π‘’πΌπ‘šπ‘π‘’π‘Ÿπ‘ π‘œπ‘›π‘Žπ‘‘π‘’π‘ƒπ‘Ÿπ‘–π‘£π‘–π‘™π‘’π‘”π‘’ or π‘†π‘’π΄π‘ π‘ π‘–π‘”π‘›π‘ƒπ‘Ÿπ‘–π‘šπ‘Žπ‘Ÿπ‘¦π‘‡π‘œπ‘˜π‘’π‘›π‘ƒπ‘Ÿπ‘–π‘£π‘–π‘™π‘’π‘”π‘’ permissions.

To increase your chances of success in using them, you'll want to start at the newest (9), and work your way back to (1).

Here are all the popular potatoes in chronological order from oldest (1) to newest (9):

  1. Hot Potato - NTLM relay (HTTP->SMB relay) and NBNS spoofing
  2. Rotten Potato - Windows Service Accounts
  3. Juicy Potato - Windows Service Accounts
  4. Lonely Potato - DCOM (Distributed Component Object Model)
  5. Rogue Potato - RPC over custom ports
  6. Sweet Potato - Print Spooler
  7. Generic Potato - HTTP and named pipes
  8. SharpEfsPotato - EfsRpc
  9. God Potato - DCOM (Distributed Component Object Model)
  10. Local Potato - NTLM authentication challenge process

Releases

No releases published

Packages

No packages published