Chapter 6: Impersonation Attacks
Now that you have got your hands dirty with the privilege escalation process on Windows, we can begin exploring other attack vectors that can be exploited to elevate our privileges. In this chapter, we will be taking a closer look at Windows access tokens, how they work, and how they can be leveraged to elevate our privileges through impersonation attacks.
The practical demonstrations in this chapter will primarily be focused on how to enumerate privileges on a system to determine whether it is vulnerable to impersonation attacks and how to generate or impersonate a privileged Windows access token that can be used to elevate our privileges.
We will also look at how to use various built-in meterpreter
modules to automate the token impersonation process on a target system.
In this chapter, we're going to cover the following main topics:
- Understanding Windows access tokens
- Enumerating privileges
- Token impersonation attacks...