
- #How to use process monitor to trace clsid how to
- #How to use process monitor to trace clsid windows
In this call the proxy IP/Por t is specified. Trick RPC to authenticate to the proxy with the CoGetInstanceFromIStorage API call.

AcceptSecurit圜ontext API call to locally impersonate NT AUTHORITY/SYSTEM RPC in port 135 that is going to be used to reply all the request that the first RPC is performing. RPC that is running through NT AUTHORITY/SYSTEM that is going to try to authenticate to our local proxy through the CoGetInstanceFromIStorage API Call. Rotten Potato is quite complex, but mainly it uses 3 things: MS16-077 WPAD Name Resolution will not use NetBIOS (CVE-2016-3213) and does not send credential when requesting the PAC file(CVE-2016-3236). What this means is that SMB->SMB NTLM relay from one host back to itself will no longer work. Microsoft patched this (MS16-075) by disallowing same-protocol NTLM authentication using a challenge that is already in flight. Is this vulnerability exploitable right now?

Potato.exe -ip -cmd -disable_exhaust true -disable_defender true To understand deeper this technique, the researchers post/video are recommended:ĭownload the binary from the repository: Here If the machine is SMB NTLM Relay: Relays the WAPD NTLM token to the SMB service to create an elevated process.
#How to use process monitor to trace clsid windows
If the machine is >= Wind& Windows Server 2019 - Try Rogue Potato

Use Sweet Potato to rule them all - Sweet Potato.
#How to use process monitor to trace clsid how to
But, what are the differences? When should I use each one? Do they still work? This post is a summary of each kind of potato, when to use it and how to achieve successful exploitation. There are a lot of different potatoes used to escalate privileges from Windows Service Accounts to NT AUTHORITY/SYSTEM. Hot, Rotten, Lonely, Juicy, Rogue, Sweet, Generic potatoes.
