From c9bb813f1d0d2e39e50210cbfbf2f01806a5f372 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Sun, 26 Aug 2018 22:35:24 +0700 Subject: [PATCH] =?UTF-8?q?[Add]=20Hot=20Potato=20=E2=80=93=20Windows=20Pr?= =?UTF-8?q?ivilege=20Escalation?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 7bc459c..39ca244 100644 --- a/README.md +++ b/README.md @@ -511,6 +511,10 @@ _return-to-libc techniques_ - [DCShadow: Attacking Active Directory with Rouge DCs](https://blog.stealthbits.com/dcshadow-attacking-active-directory-with-rogue-dcs/) - [DCShadow explained: A technical deep dive into the latest AD attack technique](https://blog.alsid.eu/dcshadow-explained-4510f52fc19d?gi=fe7b55fa3114) +##### Hot Potato + +- [Hot Potato – Windows Privilege Escalation](https://foxglovesecurity.com/2016/01/16/hot-potato/) + #### Post Exploitation Platform: Unix/Linux - [GTFOBins - GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.](https://gtfobins.github.io/)