NTLM elevation of privilege
RemotePotato
Windows Privilege Escalation from User to Domain Admin. NTLM Relay
Relay NetNTLMv2 to SMB
Very effective on e.g. terminal server where admin/domain admins are logged on
On the target system:
e.g. CLSID: 5167B42F-C111-47A1-ACC4-8EABE61B0B54
On attacker system:
Relaying NTLM to SMB to dump local hives on a remote system with local admin privileges
On target system:
e.g. CLSID: F8842F8E-DAFE-4B37-9D38-4E0714A61149
On attacker system:
LocalPotato
CVE-2023-21746, Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the NTLM component. By executing a specially-crafted program, an authenticated attacker could exploit this vulnerability to obtain SYSTEM privileges.
Last updated
