Token Impersonation
We have already seen an example of using Cobalt Strike's steal_token
command in the context of overpass the hash. However, if we elevate or land on a system where a user is running a process, we can impersonate its token without having to jump through additional hoops.
If we list the running processes on Workstation 2 from an elevated prompt, we see that jking is running an instance of mmc.exe.
\
We can simply steal its token and access a target.
\
The obvious downside is that if the user closes the process, our ability to abuse it goes away. By taking the additional steps of extracting tickets or hashes, we provide ourselves a more guaranteed or "future-proof" way of leveraging the credential material.
Last updated