🔬Access Token
Last updated
Was this helpful?
Last updated
Was this helpful?
🔬
Target IP:
10.4.22.75
Access Token impersonation
Determine the version information of the web server on port 80
Without using nmap
, the http
server version can be checked in a browser by opening the link
http://10.4.22.75/
Set the target IP as GLOBAL RHOSTS variable
Migrate current x86 meterpreter
session to a x64 process
This meterpreter
session (with this particular user account) can be utilized to impersonate other access tokens available.
ATTACKDEFENSE\Administrator
account access token would provide elevated privileges
Listing tokens with this account, there can be additional available tokens
NT AUTHORITY\SYSTEM
can be impersonated, getting the privileges associated with its access token
In the case of no Delegation or Impersonation tokens found, the Potato Attack
can be used to get or generate a NT AUTHORITY/SYSTEM
access token, impersonating it and obtain privileges associated to it.
Get the flag of the lab: