Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012 … and a new network attack How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it’s because a similar technique was disclosed by the guys at Go
![Hot Potato – Windows Privilege Escalation](https://cdn-ak-scissors.b.st-hatena.com/image/square/03294c0129c8d7caaf18113ccb527fa7532ac3ac/height=288;version=1;width=512/https%3A%2F%2Ffoxglovesecurity.com%2Fwp-content%2Fuploads%2F2015%2F10%2Fegolstein_spoofing.png)