Privilege escalation via access token manipulation. Steal and impersonate user/process tokens to elevate privileges.
Steal and Reuse Authentication Tokens
Requires: Code execution • Difficulty: Intermediate • Impact: High
💻 Desktop Experience Available
View this module on desktop for an interactive Token Impersonation privilege escalation simulation.
Token Impersonation is an Active Directory attack technique that allows attackers to steal and reuse authentication tokens from other processes or users. Windows uses access tokens to represent user identity and privileges. By impersonating high-privilege tokens, attackers can escalate privileges or access resources without knowing passwords.
Attackers use tools like Mimikatz to steal tokens from running processes. High-privilege tokens (from SYSTEM, domain admins, or service accounts) can be impersonated to gain elevated access. This technique allows privilege escalation without password cracking or credential theft.
Why It's Effective: Tokens exist in memory for all running processes. If an attacker has code execution (even as a low-privilege user), they can steal tokens from high-privilege processes. No network traffic, no authentication attempts—just memory manipulation.
Token Impersonation techniques should only be used in authorized penetration testing, red team engagements, or controlled lab environments. Unauthorized access to computer systems is illegal under CFAA and equivalent laws worldwide. Always obtain written permission before testing.
📡 Interactive Simulation Mode
Steal authentication tokens from running processes. Impersonate high-privilege users. Escalate privileges without passwords.
Memory Access → Token Extraction → Impersonation
Current User: CORP\lowpriv
Windows stores authentication tokens in process memory. Attackers use tools like Mimikatz to steal tokens from high-privilege processes and impersonate them to gain elevated access. No password needed—just memory access.
Requires code execution and SeDebugPrivilege to access process memory. Often used after initial compromise for privilege escalation.