From 4bfe79edf2a18db13f362feccdb8eea224f85a9f Mon Sep 17 00:00:00 2001 From: pe3zx Date: Mon, 5 Feb 2018 20:39:20 +0700 Subject: [PATCH] =?UTF-8?q?[Article][Exploitation]:=20Rotten=20Potato=20?= =?UTF-8?q?=E2=80=93=20Privilege=20Escalation=20from=20Service=20Accounts?= =?UTF-8?q?=20to=20SYSTEM?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 8f6edb8..b67650e 100644 --- a/README.md +++ b/README.md @@ -216,6 +216,7 @@ My curated list of awesome links, resources and tools - [Reading Your Way Around UAC (Part 2)](https://tyranidslair.blogspot.com/2017/05/reading-your-way-around-uac-part-2.html) - [Reading Your Way Around UAC (Part 3)](https://tyranidslair.blogspot.com/2017/05/reading-your-way-around-uac-part-3.html) - [Reflective DLL Injection](https://0x00sec.org/t/reflective-dll-injection/3080) +- [Rotten Potato – Privilege Escalation from Service Accounts to SYSTEM](https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/) - [sam-b/windows_kernel_resources](https://github.com/sam-b/windows_kernel_resources) - [Sharks in the Pool :: Mixed Object Exploitation in the Windows Kernel Pool](http://srcincite.io/blog/2017/09/06/sharks-in-the-pool-mixed-object-exploitation-in-the-windows-kernel-pool.html) - [Signing Mimikatz](https://twitter.com/subTee/status/912769644473098240)