Abusing the Golden Privileges

Permissions: User

Let's say that we have enable SeImpersonatePrivilege or SeAssignPrimaryToken privilege in the machine, we can use juicypotato binary to try to impersonate commands as administrator user, If the user has SeImpersonate or SeAssignPrimaryToken privileges then you are SYSTEM.

Here you can see how I create a user using the juicypotato exploit.

Use a respective CLSID to the windows version in case the exploit doesn't work and try again.

Last updated