EXPLORE
← Back to Explore
T1134.001

Token Impersonation/Theft

Adversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access controls. For example, an adversary can duplicate an existing token using `DuplicateToken` or `DuplicateTokenEx`.(Citation: DuplicateToken function) The token can then be used with `ImpersonateLoggedOnUser` to allow the calling thread to impersonate a logged on user's security context, or with `SetThreadToken` to assign the impersonated token to a thread. An adversary may perform [T...

Windows
20
Detections
3
Sources
2
Threat Actors

BY SOURCE

9sigma7elastic4splunk_escu

PROCEDURES (13)

Credential2 detections

Auto-extracted: 2 detections for credential

Remote2 detections

Auto-extracted: 2 detections for remote

Named Pipe2 detections

Auto-extracted: 2 detections for named pipe

Api2 detections

Auto-extracted: 2 detections for api

Service2 detections

Auto-extracted: 2 detections for service

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Token2 detections

Auto-extracted: 2 detections for token

Service1 detections

Auto-extracted: 1 detections for service

Named Pipe1 detections

Auto-extracted: 1 detections for named pipe

Privilege1 detections

Auto-extracted: 1 detections for privilege

Bypass1 detections

Auto-extracted: 1 detections for bypass

Privilege1 detections

Auto-extracted: 1 detections for privilege

Api1 detections

Auto-extracted: 1 detections for api

THREAT ACTORS (2)

DETECTIONS (20)