Token Impersonation
Token Impersonation
If we elevate or pop a SYSTEM where a user is running a process, we can impersonate it's token.
For example:
If we are SYSTEM, we can steal robert's token and impersonate them.
Note: If the user closes the process, our ability to impersonate goes with it. We must take additional steps of extracting tickets or hashes after stealing the token.
Cobalt Strike - steal_token
Last updated