Token Impersonation
Last updated
Was this helpful?
Last updated
Was this helpful?
Tokens are temporary keys that provide access to a system or network. With these, you do not have to provide credentials each time to access a file.
There are two types of tokens:
Delegate: This type of token is created for logging into a machine or using RDP. These tokens exists until the computer is rebooted.
Impersonate: These are non-interactive such as attaching a network drive or a domain logon script.
If we gain access to a machine and we have token of a domain admin that we can impersonate, we have domain admin access.
This will only work if the token of administrator is present on the computer. This means that it will only work if there is an admin/user session (admin/user logged in) to that computer.