<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>potato.exe &#8211; ChaBug安全</title>
	<atom:link href="/tags/potato-exe/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 23 Aug 2019 01:22:34 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>Juicy Potato &#8211; 本地特权提升工具</title>
		<link>/tools/568.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sun, 26 Aug 2018 06:55:43 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[potato.exe]]></category>
		<category><![CDATA[提权]]></category>
		<guid isPermaLink="false">/?p=568</guid>

					<description><![CDATA[这是又一个本地特权提升工具，从Windows服务帐户到NT AUTHORITY\SYSTEM ，如果用户拥有SeImpersonate 或拥有SeAssignPrimaryToke...]]></description>
										<content:encoded><![CDATA[<p>这是又一个本地特权提升工具，从Windows服务帐户到<span class="lang:default decode:true crayon-inline ">NT AUTHORITY\SYSTEM</span> ，<strong>如果用户拥有<span class="lang:default decode:true crayon-inline ">SeImpersonate</span> 或拥有<span class="lang:default decode:true crayon-inline ">SeAssignPrimaryToken</span> 权限，那么你就可以获取到SYSTEM。</strong></p>
<h1>详细介绍</h1>
<p>JuicyPotato允许您：</p>
<ul>
<li><strong>Target CLSID </strong><br />
<em>选择您想要的任何CLSID。<a href="https://github.com/ohpe/juicy-potato/blob/master/CLSID/README.md">在这里，</a>您可以找到由OS组织的列表。</em></li>
<li><strong>COM侦听端口</strong><br />
<em>定义您喜欢的COM侦听端口（而不是编组的硬编码6666）</em></li>
<li><strong>COM侦听IP地址</strong><br />
<em>绑定任何IP上的服务器</em></li>
<li><strong>进程创建模式</strong><br />
<em>取决于您可以选择的模拟用户权限：</em></p>
<ul>
<li><code>CreateProcessWithToken</code>（需要<code>SeImpersonate</code>）</li>
<li><code>CreateProcessAsUser</code>（需要<code>SeAssignPrimaryToken</code>）</li>
<li><code>both</code></li>
</ul>
</li>
<li><em>如果开发成功</em><strong>，则启动</strong><em>启动可执行文件或脚本的</em><strong>过程</strong></li>
<li><strong>Process Argument </strong><br />
<em>自定义已启动的流程参数</em></li>
<li><em>您可以对外部RPC服务器进行身份验证的隐秘方法的</em><strong>RPC服务器地址</strong></li>
<li><em>如果要对外部服务器进行身份验证并且防火墙阻止端口，则</em><strong>RPC服务器端口</strong><br />
<em>很有用<code>135</code>&#8230;</em></li>
<li><strong>TEST模式</strong><br />
<em>主要用于测试目的，即测试CLSID。它创建DCO​​M并打印令牌的用户。请看<a href="https://github.com/ohpe/juicy-potato/blob/master/Test/README.md">这里进行测试</a></em></li>
</ul>
<h1>用法</h1>
<pre class="lang:default decode:true ">T:\&gt;JuicyPotato.exe
JuicyPotato v0.1

Mandatory args:
-t createprocess call: &lt;t&gt; CreateProcessWithTokenW, &lt;u&gt; CreateProcessAsUser, &lt;*&gt; try both
-p &lt;program&gt;: program to launch
-l &lt;port&gt;: COM server listen port


Optional args:
-m &lt;ip&gt;: COM server listen address (default 127.0.0.1)
-a &lt;argument&gt;: command line argument to pass to program (default NULL)
-k &lt;ip&gt;: RPC server ip address (default 127.0.0.1)
-n &lt;port&gt;: RPC server listen port (default 135)
-c &lt;{clsid}&gt;: CLSID (default BITS:{4991d34b-80a1-4291-83b6-3328366b9097})
-z only test CLSID and print token's user</pre>
<h1>样例</h1>
<p><a href="https://raw.githubusercontent.com/ohpe/juicy-potato/master/assets/poc.png"><img loading="lazy" class="alignnone size-medium" src="https://raw.githubusercontent.com/ohpe/juicy-potato/master/assets/poc.png" width="851" height="499" /></a></p>
<h1>Github</h1>
<p><a href="https://github.com/ohpe/juicy-potato">https://github.com/ohpe/juicy-potato</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
