Detecting LocalPotato (CVE-2023-21746) Privilege Escalation Attacks on Windows

preview_player
Показать описание
You've probably heard about potatoes on Windows -- starting with HotPotato in 2016, followed by RottenPotato, JuicyPotato, and SweetPotato, among many others Potatoes are a collection of privilege escalation attacks on Windows that typically abuse authentication mechanisms, credentials/tokens and services with impersonation privileges. LocalPotato (CVE-2023-21746) is the newest in the potato family, and abuses flaws in the NTLM authentication challenge process that allow arbitrary file reads and writes as system. We'll demonstrate two ways to use LocalPotato to escalate privileges: by copying the SAM/SYSTEM files and dumping password hashes, and a new privilege escalation against the StorSvc service. As always, we'll discuss detection and threat hunting strategies for these attacks.

References:

SnapAttack Content:
Рекомендации по теме
Комментарии
Автор

Awesome channel. Please keep posting technical news on infosec related matters. It's not for everyone but in time your channel will be sure to grow.

flyingllama
Автор

Hello, I'm the co-author of LocalPotato. Just wanted to point out that the arbitrary file read (in this case does not work unless you're an administrator (as shown in your demo lab) or the machine was not patched against an old vulnerability which permitted a standard user to access the SAM/SYSTEM hive form a shadow copy. Minute 3.21

andreapierini