Potato attacks are a family of Windows privilege escalation techniques that abuse SeImpersonatePrivilege
Why "Potato"? The first technique was called "Hot Potato", and the name stuck. Now we have a whole garden: JuicyPotato, RoguePotato, PrintSpoofer, SweetPotato, and more. Each works slightly differently but achieves the same goal: SYSTEM access from SeImpersonate.
Service Account Essential
The Potato Family
Which Potato to Use?
PrintSpoofer
PrintSpoofer is the simplest and most reliable Potato attack for modern Windows systems. It abuses the Print Spooler service to get SYSTEM.
Print Spooler Disabled
JuicyPotato
Finding Valid CLSIDs
RoguePotato
SweetPotato
Choosing the Right Potato
Complete Attack Example
Potato Attack Methodology
Potato Attack Flow
Knowledge Check
Challenges
Key Takeaways
- Potato attacks turn SeImpersonatePrivilege into SYSTEM access
- PrintSpoofer: Best for modern Windows with Print Spooler
- JuicyPotato: For older Windows, needs valid CLSID
- Service accounts (IIS, SQL) often have SeImpersonate
- Always check OS version to choose correct tool
- SweetPotato/GodPotato try multiple techniques automatically