Technology > Cybersecurity6/26/2025 6:00 PM
Cybersecurity Webinar Benefits
Welcome to the farm! Today's task: harvesting potatoes. The potato exploits have been a cornerstone of local priv esc on Windows system for years, but how and why do the inner starchy workings of the potatoes function? Plow into understanding Windows access tokens and their use in the Windows environment, followed by a technical walkthrough of how Rotten, Juicy, and Rogue potatoes work, and a wrap up that covers some defensive suggestions.
Speakers:
Max Andreacchi - Associate Consultant at SpecterOps
Luke Luckett - Product Marketing lead at SpecterOps