🔬Access Token
Lab 1
🔬 Privilege Escalation: Impersonate
Target IP:
10.4.22.75
Access Token impersonation
Enumeration
Determine the version information of the web server on port
80
Without using
nmap
, thehttp
server version can be checked in a browser by opening the linkhttp://10.4.22.75/
Exploitation
Set the target IP as GLOBAL RHOSTS variable
Migrate current x86
meterpreter
session to a x64 process
This
meterpreter
session (with this particular user account) can be utilized to impersonate other access tokens available.
Privilege Escalation
Access Token Impersonation
ATTACKDEFENSE\Administrator
account access token would provide elevated privileges
Listing tokens with this account, there can be additional available tokens
NT AUTHORITY\SYSTEM
can be impersonated, getting the privileges associated with its access token
In the case of no Delegation or Impersonation tokens found, the
Potato Attack
can be used to get or generate aNT AUTHORITY/SYSTEM
access token, impersonating it and obtain privileges associated to it.Get the flag of the lab:
Last updated