1 min read
Commonly Abused Windows Token Privileges: SeAssignPrimaryTokenPrivilege
SeAssignPrimaryTokenPrivilege — Replace a process level token Determines which parent processes can replace the access token that is associated with...
Henry Zhang
:
Updated on November 4, 2025
Determines which users can attach to or open any process, even a process they do not own. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides access to sensitive and critical operating-system components.
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment
Debug programs
SeDebugPrivilege
Persistence (TA0003), Privilege Escalation (TA0004), Defense Evasion (TA0005), Credential Access (TA0006)
1 min read
SeAssignPrimaryTokenPrivilege — Replace a process level token Determines which parent processes can replace the access token that is associated with...
1 min read
SeCreateTokenPrivilege — Create a token object Determines which accounts a process can use to create a token, and which accounts it can then use to...
1 min read
SeTakeOwnershipPrivilege — Take ownership of files or other objects Determines which users can take ownership of any securable object in the device,...