Skip to content

Prepouce/RemoteCoercedPotato

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

RemoteCoercedPotato

Remote
   ____                            _ ____       _        _        
  / ___|___   ___ _ __ ___ ___  __| |  _ \ ___ | |_ __ _| |_ ___  
 | |   / _ \ / _ \ '__/ __/ _ \/ _` | |_) / _ \| __/ _` | __/ _ \ 
 | |__| (_) |  __/ | | (_|  __/ (_| |  __/ (_) | || (_| | || (_) |
  \____\___/ \___|_|  \___\___|\__,_|_|   \___/ \__\__,_|\__\___/ 
                                                                  
                                           @Hack0ura @Prepouce                         

A quick POC of a Coerced Patate but remotly (just for fun).

From Patate (LOCAL/NETWORK SERVICE) to SYSTEM by abusing SeImpersonatePrivilege on Windows 10, Windows 11 and Server 2022.

For more information: https://blog.hackvens.fr/articles/CoercedPotato.html (The english version is coming soon!! 😄)

Usage

First, you can check the help message using the --help option.

A very quick PoooooC:

  • Without random namedpipe (default):
    ./CoercedPotatoServer.exe -c cmd.exe
    ./CoercedPotatoClient.py -u user -p password 127.0.0.1 [targeted_IP]
  • With a random namedpipe, given by CoercedPotatoServer.exe:
    ./CoercedPotatoServer.exe -c cmd.exe -r true 
    ./CoercedPotatoClient.py -n [randomnamedpipe] -u user -p password -r true 127.0.0.1 [targeted_IP] 

2024-05-28_17-19

Todo

  • Implemention of MS-RPRN interfacce

  • Creation a powershell of a bytecode version of the namedPipe server

Made in France 🇫🇷 with <3

About

A working PoC of a "remote" Coercedpotato

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published