Abusing and Manipulating Windows Access Tokens.
TokenPlayer is just a small tool i made to learn win32 api programming and understand better the access token model of windows.
- Stealing and Impersonating primary tokens.
- Impersonating Protected Processes.
- It can be used from non-interactive contexts (e.g. reverse shell) by using pipes for parent-child process communication.
- Making new tokens for network authentication by providing credentials (similar to runas /netonly) without the need for special rights or elevated context.
- Bypassing UAC by using the Token-Duplication method.
General options:
--help Display help menu.
Impersonation Options:
--impersonate Impersonates the specified pid and spawns a new child
process under its context.
--pid arg Proccess ID to steal the token from.
--spawn Spawns a new command prompt under the context of the
stolen token.
Execution Options:
--exec Execute an instance of a specified program under the
impersonated context.
--pid arg Proccess ID to steal the token from.
--prog The full path to the program to be executed.
--args Optional execution arguments for the specified
program.
Make Token Options:
--maketoken Create a new process under a set of creds for only
network authentication (Similar to runas /netonly).
--username arg Username
--password arg Password in plaintext format.
--domain arg The domain the user belongs, if domain isn't specified
the local machine will be used.
UAC Bypass Options:
--pwnuac Will try to bypass UAC using the token-duplication
method.
--spawn Spawns a new elevated prompt.
To compile it yourself you will need to install the boost library, because it uses it for parsing and handling the command line arguments. Also you'll need to specify the external library's folder on the project's settings.
- Windows Access Tokens and Alternate Credentials
- Understanding and Defending Against Access Token Theft
- T1134: Primary Access Token Manipulation
- Privilege escalation through Token Manipulation
- Creating a Child Process with Redirected Input and Output
- Reading Your Way Around UAC (Part 1)
- Reading Your Way Around UAC (Part 2)
- Reading Your Way Around UAC (Part 3)
- UAC-TokenMagic.ps1
- UAC-TokenDuplication
- RunasCs