Commonly Abused Windows Token Privileges: SeTcbPrivilege

SeTcbPrivilege— Act as part of the operating system

Determines whether a process can assume the identity of any user and thereby gain access to the resources that the user is authorized to access. Typically, only low-level authentication services require this user right. Potential access is not limited to what is associated with the user by default. The calling process may request that arbitrary additional privileges be added to the access token. The calling process may also build an access token that does not provide a primary identity for auditing in the system event logs.

GPO Setting Path

Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment

GPO Setting Name

Act as part of the operating system

Token Privilege

SeTcbPrivilege

Associated ATT&CK Tactic(s)

Privilege Escalation (TA0004)

Commonly Abused Windows Token Privileges: SeImpersonatePrivilege

SeImpersonatePrivilege — Impersonate a client after authentication Determines which programs are allowed to impersonate a user or another specified...

READ MORE

Windows Logon Session Types: NetworkCleartext

Logon Type — NetworkCleartext Used to logon with credentials sent in clear text (only possible for certain services).

READ MORE

Windows Logon Session Types: Network

Logon Type — Network Used to access a Windows resource (e.g. shared folder) from a system on the network.

READ MORE