Welcome to my blog!
$whoami decoder $finger decoder Login: decoder Name: IT Security enthusiast Directory: /italy Shell: /sbin/shell2heaven Always logged in. decoder[dot]ap[at]gmail[dot]com No spam. Twitter: @decoder_it Enjoy and leave comments!
My posts:
Elevation of privilege in Group Policy Client CVE-2022-37955
When Swapping the Context leads you to SYSTEM
Giving JuicyPotato a second chance: JuicyPotatoNG
Group Policy Folder Redirection CVE-2021-26887
A not-so-common and stupid privilege escalation
Hands off my (MS) cloud services!
When a stupid oplock leads you to SYSTEM
When ntuser.pol leads you to SYSTEM
No more JuicyPotato? Old story, welcome RoguePotato!
From NETWORK SERVICE to SYSTEM
Exploiting Feedback Hub in Windows 10
The strange case of “open-ssh” in Windows Server 2019
The strange RPC interface (MS, are you trolling me?)
From dropbox(updater) to NT AUTHORITY\SYSTEM
From iPhone to NT AUTHORITY\SYSTEM
We thought they were potatoes but they were beans (from Service Account to SYSTEM again)
From arbitrary file overwrite to SYSTEM
Creating Windows Access Tokens
Windows Named Pipes & Impersonation
Demystifying Windows Service “permissions” configuration
Creating Symbolic Links in Windows 10
Fear the Rotten/Juicy potato attack?
Slides from my talk “whoami /priv” at Romhack 2018
Juicy Potato (abusing the golden privileges)
Windows e le privilege escalations che non ti aspetti (italian)
The lonely potato (here) you can download the entire c# project
We don’t need powershell.exe – 4 –
“Poor man’s process migration”
We don’t need powershell.exe -part 3-
We don’t need powershell.exe – part 2 –
From Pass-the-Hash to Pass-the-Ticket with no pain
Simple ASLR/NX bypass on a Linux 32 bit binary
Bypassing UAC from a remote powershell and escalting to “SYSTEM”
Idiot’s quick & dirty guide to buffer overflow on GNU/Linux X64 architecture
“Speedy” HTTP2 challenge on game.rop.sh
Make a one-time donation
Make a monthly donation
Make a yearly donation
Choose an amount
Or enter a custom amount
Your contribution is appreciated.
Your contribution is appreciated.
Your contribution is appreciated.
DonateDonate monthlyDonate yearlyAny actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The author of decoder.cloud will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.
Hey just to say i’ve really enjoyed all your blogs, i’ve been going through them one by one and they’ve been incredibly helpful.
LikeLike
Thanks!
LikeLike
Interesting work!!
LikeLike
Thanks!
LikeLike
Good time
I want to use a Juicy potato for a penetration testing project But the antivirus on the server removes the Juicy potato.
Is there a way to bypass this?
LikeLiked by 1 person
Download the source code, make some dummy changes and recompile it
LikeLiked by 1 person