Token Impersonation
Tokens
like cookies for computers
temp keys that allow you to access system/network without providing creds each time
Two types
Delegate
created for logging in or using remote desktop
Impersonate
non-interactive, such as attaching a network drive or a logon script
Attack
Metasploit
Get a meterpreter shell
load incognito
list_tokens -u
impersonate_token [user listed] (ie: marvel\fcastle)
shell
once we have been able to get local admin on a machine, we can add a user for our benefit
Defense
Limit user/group token creation permission
Account tiering
Local admin restriction
Last updated