Commonly Abused Windows Token Privileges: SeAssignPrimaryTokenPrivilege
SeAssignPrimaryTokenPrivilege — Replace a process level token Determines which parent processes can replace the access token that is associated with...
Determines which users can attach to or open any process, even a process they do not own. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides access to sensitive and critical operating-system components.
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment
Debug programs
SeDebugPrivilege
Persistence (TA0003), Privilege Escalation (TA0004), Defense Evasion (TA0005), Credential Access (TA0006)
SeAssignPrimaryTokenPrivilege — Replace a process level token Determines which parent processes can replace the access token that is associated with...
SeCreateTokenPrivilege — Create a token object Determines which accounts a process can use to create a token, and which accounts it can then use to...
SeTcbPrivilege— Act as part of the operating system Determines whether a process can assume the identity of any user and thereby gain access to the...