'Token'에 해당되는 글 7건
- 2022.09.02 NtCreateToken
- 2021.02.15 Access Tokens
- 2021.02.02 Token modification
- 2018.03.20 Process Token Dumper
- 2018.01.29 User Rights and Privileges
- 2014.02.28 Restricting Privileges on Windows
- 2013.09.17 Windows Privilege Escalation
NtCreateToken

Return Codes
- STATUS_SUCCESS - Indicates the operation was successful.
- STATUS_INVALID_OWNER - Indicates the ID provided to be assigned
as the default owner of the token does not have an attribute
indicating it may be assigned as an owner. - STATUS_INVALID_PRIMARY_GROUP - Indicates the group ID provided
via the PrimaryGroup parameter was not among those assigned
to the token in the Groups parameter. - STATUS_BAD_IMPERSONATION_LEVEL - Indicates no impersonation level
was provided when attempting to create a token of type
TokenImpersonation.
Abusing Token Privileges For LPE
Abusing Token Privileges For LPE
Abusing Token Privileges For LPE EDB-ID: 42556 CVE: N/A Date: 2017-08-28
www.exploit-db.com
creating-windows-access-tokens
GitHub - decoder-it/CreateTokenExample
Creating Windows Access Tokens
Some time ago I was playing with the STOPZilla exploit which is very interesting and educational because it shows how you can abuse from an arbitrary write from the userland into the kernel. In thi…
decoder.cloud
GUI-Based RunAsEx
An ultimate tool that lets you RunAs... (With support for non-Pwd, WTS, fake privilege, fake user groups, etc...)
www.codeproject.com
Understanding Windows Access Token Manipulation
Understanding Windows Access Token Manipulation
Finding alternatives to winlogon.exe to steal SYSTEM access tokens from. Presented at HushCon 2019
www.slideshare.net
Understanding and Defending Against Access Token Theft
Understanding and Defending Against Access Token Theft: Finding Alternatives to winlogon.exe
A dive into Windows processes, access tokens, SACLs, WinAPI and access token manipulation.
posts.specterops.io
Social Engineering the Windows Kernel by James Forshaw
Social Engineering the Windows Kernel by James Forshaw
One successful technique in social engineering is pretending to be someone or something you're not and hoping the security guard who's forgotten their reading …
www.slideshare.net
Stealing Tokens In Kernel Mode With A Malicious Driver
Stealing Tokens In Kernel Mode With A Malicious Driver - SolomonSklash.io
Stealing Tokens In Kernel Mode With A Malicious Driver Introduction I’ve recently been working on expanding my knowledge of Windows kernel concepts and kernel mode programming. In the process, I wrote a malicious driver that could steal the token of one
www.solomonsklash.io
Token Abuse for Privilege Escalation in Kernel
Token Abuse for Privilege Escalation in Kernel
www.ired.team
We can add privileges to the groups or uses by the Security Policy consoles, but we can't add privileges to the existing token according to this article
Part1 :Local Administrator Privileges
Part2 : Domain Admin Privileges
https://www.netspi.com/blog/entryid/113/windows-privilege-escalation-part-2-domain-admin-privileges
Tokenvator: A Tool to Elevate Privilege using Windows Tokens