1 min read

Commonly Abused Windows Token Privileges: SeLoadDriverPrivilege

SeLoadDriverPrivilege — Load and unload device drivers

Determines which users can dynamically load and unload device drivers. This user right is not required if a signed driver for the new hardware already exists in the driver.cab file on the device. Device drivers run as highly privileged code. Windows supports the Plug and Play specifications that define how a computer can detect and configure newly added hardware, and then automatically install the device driver. Prior to Plug and Play, users needed to manually configure devices before attaching them to the device. This model allows a user to plug in the hardware, then Windows searches for an appropriate device driver package and automatically configures it to work without interfering with other devices.

Because device driver software runs as if it is a part of the operating system with unrestricted access to the entire computer, it is critical that only known and authorized device drivers be permitted.

GPO Setting Path

Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment

GPO Setting Name

Load and unload device drivers

Token Privilege

SeLoadDriverPrivilege

Associated ATT&CK Tactic(s)

Persistence (TA0003), Privilege Escalation (TA0004), Defense Evasion (TA0005)

Windows Logon Session Types: Unlock

Logon Type — Unlock Used to unlock an Interactive Logon session. Creates a new Type 2 (Interactive) logon type.

READ MORE

Windows Logon Session Types: NewCredentials

Logon Type — NewCredentials Used with RunAs or mapping a network drive with alternate credentials. Create a new logon session for the same user but...

READ MORE

Commonly Abused Windows Token Privileges: SeTakeOwnershipPrivilege

SeTakeOwnershipPrivilege — Take ownership of files or other objects Determines which users can take ownership of any securable object in the device,...

READ MORE