πŸ”
OffSec Wiki
search
⌘Ctrlk
πŸ”
OffSec Wiki
  • Tools
  • Information Gathering
  • Exploitation
  • Cracking
  • Enumeration
  • API Sec
  • Web Pentesting
  • Linux
  • Wordpress
  • Post Exploitation
    • File Transfers
    • Creds Dumping
    • Linux
    • Windows
      • Local Priv Exploits
      • Windows Priv Esc
      • Win Priv Esc II
      • Windows Kernel Exploits
      • Win Priv Esc - TCM Course
      • Windows Process Dump
      • Impersonation
      • C2 Frameworks and Win Shells
      • Maintaining Access
      • Potato Attacks
      • Alternate Data Streams
      • Evade Defender
      • Disable Win Defender
      • PrivEsc Resources
    • Buffer Overflow
    • Cloud Priv Esc
    • LXC Privesc
  • Persistence
  • Powershell
  • RED Teaming
  • Purple Teaming
  • Reverse Engineering
  • Pivoting
  • Metasploit
  • Networking
  • OSINT
  • Active Directory
  • Cloud
  • Containers
  • WIFI
  • Buffer Overflow
  • Code Review
  • Routers
  • Automotive CyberSec
  • Threat Modeling
  • Hardware & Lock Bypassing
  • Scripting
  • General PT Methodology
  • Blockchain
  • Challenges
  • Flipper
  • CERTS
  • Notes
  • Hacking Kubernetes
  • CV
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Post Exploitationchevron-right
  2. Windows

Potato Attacks

LogoRotten Potato – Privilege Escalation from Service Accounts to SYSTEMfoxglovesecchevron-right
LogoGitHub - ohpe/juicy-potato: A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.GitHubchevron-right
LogoPage not found - HackTricksbook.hacktricks.xyzchevron-right

# reverse shell for Jenkins console

https://gist.github.com/frohoff/fed1ffaab9b9beeb1c76arrow-up-right

PreviousMaintaining Accesschevron-leftNextAlternate Data Streamschevron-right

Last updated 3 years ago