🔬Access Token

Lab 1

🔬 Privilege Escalation: Impersonate

  • Target IP: 10.4.22.75

  • Access Token impersonation

Enumeration

nmap 10.4.22.75
PORT      STATE SERVICE
80/tcp   open  http
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
3389/tcp open  ms-wbt-server
  • Determine the version information of the web server on port 80

nmap -sV -p 80 10.4.22.75
80/tcp open  http    HttpFileServer httpd 2.3
  • Without using nmap, the http server version can be checked in a browser by opening the link

    • http://10.4.22.75/

Exploitation

  • Set the target IP as GLOBAL RHOSTS variable

  • Migrate current x86 meterpreter session to a x64 process

  • This meterpreter session (with this particular user account) can be utilized to impersonate other access tokens available.

Privilege Escalation

Access Token Impersonation

incognito Meterpreter module
  • ATTACKDEFENSE\Administrator account access token would provide elevated privileges

Access Token Impersonation
  • Listing tokens with this account, there can be additional available tokens

  • NT AUTHORITY\SYSTEM can be impersonated, getting the privileges associated with its access token

  • In the case of no Delegation or Impersonation tokens found, the Potato Attack can be used to get or generate a NT AUTHORITY/SYSTEM access token, impersonating it and obtain privileges associated to it.

  • Get the flag of the lab:

Reveal Flag: 🚩

x28c832a39730b7d46d6c38f1ea18e12


Last updated

Was this helpful?