Token Impersonation
Last updated
Last updated
That are certain privileges in Windows that, if enabled, could lead to an attacker escalating privileges to SYSTEM or any other user account with an active and valid token on that system, through various tools that have been designed to specifically exploit this vulnerability.
Certain privileges can be exploited to either escalate privileges directly to SYSTEM or to perform actions that are normally restricted. The privileges listed below can grant direct admin access when exploited:
SeAssignPrimaryToken
Admin
3rd party tool
SeImpersonate
Admin
3rd party tool
SeBackupPrivilege
Admin
3rd party tool
SeBackup
Threat
Built-in commands
SeCreateToken
Admin
3rd party tool
SeDebug
Admin
PowerShell
SeLoadDriver
Admin
3rd party tool
SeRestore
Admin
PowerShell
SeTakeOwnership
Admin
Built-in commands
SeTcb
Admin
3rd party tool
full list is here:
in your meterpreter shell load incognito module:
list available tokens:
Impersonate Administrator:
Invokes token impersonation as a domain user. If this doesn't work you can try impersonating SYSTEM and then dumping credentials using mimikatz.
As a replacement for the last command you could do, but be vary of special characters in the command like "
and '