Senteon Blog

Technical (2)

Commonly Abused Windows Token Privileges: SeTakeOwnershipPrivilege

SeTakeOwnershipPrivilege — Take ownership of files or other objects Determines which users can take ownership of any...

READ MORE

Commonly Abused Windows Token Privileges: SeRestorePrivilege

SeRestorePrivilege — Restore files and directories Determines which users can bypass file, directory, registry, and...

READ MORE

1 min read

Commonly Abused Windows Token Privileges: SeAssignPrimaryTokenPrivilege

SeAssignPrimaryTokenPrivilege — Replace a process level token Determines which parent processes can replace the access...

READ MORE

1 min read

Commonly Abused Windows Token Privileges: SeLoadDriverPrivilege

SeLoadDriverPrivilege — Load and unload device drivers Determines which users can dynamically load and unload device...

READ MORE

1 min read

Commonly Abused Windows Token Privileges: SeImpersonatePrivilege

SeImpersonatePrivilege — Impersonate a client after authentication Determines which programs are allowed to impersonate...

READ MORE

Commonly Abused Windows Token Privileges: SeDebugPrivilege

SeDebugPrivilege — Debug programs Determines which users can attach to or open any process, even a process they do not...

READ MORE

Commonly Abused Windows Token Privileges: SeCreateTokenPrivilege

SeCreateTokenPrivilege — Create a token object Determines which accounts a process can use to create a token, and which...

READ MORE

Commonly Abused Windows Token Privileges: SeTcbPrivilege

SeTcbPrivilege— Act as part of the operating system Determines whether a process can assume the identity of any user...

READ MORE