Esc
Token Impersonation/Theft - T1134.001
(ATT&CK® Technique)
Definition
Adversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access controls. For example, an adversary can duplicate an existing token using DuplicateToken or DuplicateTokenEx. The token can then be used with ImpersonateLoggedOnUser to allow the calling thread to impersonate a logged on user's security context, or with SetThreadToken to assign the impersonated token to a thread.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.