Serivce Account Access Token

SeImpersonatePrivilege

When no tokens related to other user accounts are available in memory, we can likely force the SYSTEM account to give us a token that we can impersonate. We can impersonate anyone who connects to our named pipe.

Default assigned:

  • built-in Network Service account

  • LocalService account

  • default IIS account

may need reflective load
spoofsample
works for Network service only
works on Windows client only (not Server)

Meterpreter

impersonate any logged in users and obtain code execution in their context without access to any passwords or hashes (need SYSTEM shell, from above or below)

Last updated