wh0amitz/S4UTomato

Escalate Service Account To LocalSystem via Kerberos

C#windowsinfoseckerberosredteam
This is stars and forks stats for /wh0amitz/S4UTomato repository. As of 03 May, 2024 this repository has 324 stars and 62 forks.

S4UTomato Escalate Service Account To LocalSystem via Kerberos. Traditional Potatoes Friends familiar with the "Potato" series of privilege escalation should know that it can elevate service account privileges to local system privileges. The early exploitation techniques of "Potato" are almost identical: leveraging certain features of COM interfaces, deceiving the NT AUTHORITY\SYSTEM account to connect and authenticate to an attacker-controlled RPC server. Then, through a series of API calls, an...
Read on GithubGithub Stats Page
repotechsstarsweeklyforksweekly
squeek502/resinatorZig49020
SebLague/Chess-Coding-AdventureC#1.3k02680
lisongkun/hygge-imaotaiC#1640290
moq/moqC#Other5.4k07870
Whitecat18/Powershell-Scripts-for-Hackers-and-PentestersPowerShellVBScript2000120
adithya-s-sekhar/advanced-youtube-client-aycBatchfile73020
SimonCropp/WinDebloatC#3360220
IgorMundstein/WinMemoryCleanerC#3420380
kodlamaio-projects/nArchitectureC#64401340
HoussemDellai/docker-kubernetes-courseC#PowerShellShell8703170