What is the MITRE ATT&CK Tactic ID and name for ‘User Impersonation’?
T1550, Use Alternate Authentication Material.
What is the primary purpose of the ‘User Impersonation’ tactic in the adversary lifecycle?
To leverage credential material obtained during Credential Access to assume the identity of another user.
When a user successfully authenticates to a Windows system, the authentication package creates a new _____ for that user.
logon session
What unique identifier is associated with a Windows logon session?
A Logon Identifier, or LUID.
What entity in Windows creates an access token for a user after a successful logon?
The Local Security Authority (LSA).
An access token contains security information associated with a _____, such as the user’s SID and group memberships.
logon session
What are the two types of access tokens mentioned in the source material?
Primary and impersonation.
What type of access token is assigned to every process that starts within a logon session?
A primary access token.
In Windows, what object is checked when making access-based decisions for actions performed against securable objects?
The process’s access token.
A thread within a process can use an _____ token to carry out actions under a different identity than the main process.
impersonation
The information returned by the whoami command is generally taken from what part of the process?
The primary access token of the process.
What Windows process stores credentials like plaintext, NTLM/AES hashes, and Kerberos tickets in memory for active logon sessions?
LSASS (Local Security Authority Subsystem Service).
What is the term for the technique where an adversary impersonates an access token belonging to another user?
Token Impersonation.
In ‘Token Impersonation,’ what is the ‘Make Token’ technique?
An adversary uses the plaintext credentials of a user to create a new access token and then impersonates it.
What two Windows APIs are typically used in the ‘Make Token’ technique?
LogonUserA and ImpersonateLoggedOnUser.
What is the Beacon command to create and impersonate a new token using plaintext credentials?
make_token [DOMAIN\user] [Password]
Does the ‘Make Token’ technique require a high-integrity context?
No, it does not require a high-integrity context.
In ‘Token Impersonation,’ what is the ‘Steal Token’ technique?
An adversary steals the primary access token from a process running as a different user.
What is the first step, and corresponding API, in the process of stealing a token?
To obtain a handle to the target process using the OpenProcess API.
After obtaining a process handle, what is the next API call in the ‘Steal Token’ technique?
OpenProcessToken, to get a handle to its primary access token.
What is the Beacon command to steal and impersonate a token from a running process, given its PID?
steal_token [PID]
Does the ‘Steal Token’ technique require a high-integrity session?
Yes, it does require a high-integrity session.
What is the purpose of the rev2self command in Beacon?
It instructs Beacon to stop impersonating a token, whether it was made or stolen.
The Beacon rev2self command is a wrapper for which Windows API call?
RevertToSelf.