🔬Access Token
Lab 1
🔬 Privilege Escalation: Impersonate
Target IP:
10.4.22.75Access Token impersonation
Enumeration
nmap 10.4.22.75PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-wbt-serverDetermine the version information of the web server on port
80
nmap -sV -p 80 10.4.22.7580/tcp open http HttpFileServer httpd 2.3Without using
nmap, thehttpserver version can be checked in a browser by opening the linkhttp://10.4.22.75/
Exploitation
Set the target IP as GLOBAL RHOSTS variable
Migrate current x86
meterpretersession to a x64 process
This
meterpretersession (with this particular user account) can be utilized to impersonate other access tokens available.
Privilege Escalation
Access Token Impersonation

ATTACKDEFENSE\Administratoraccount access token would provide elevated privileges

Listing tokens with this account, there can be additional available tokens
NT AUTHORITY\SYSTEMcan be impersonated, getting the privileges associated with its access token
In the case of no Delegation or Impersonation tokens found, the
Potato Attackcan be used to get or generate aNT AUTHORITY/SYSTEMaccess token, impersonating it and obtain privileges associated to it.Get the flag of the lab:
Last updated
Was this helpful?
