Commonly Abused Windows Token Privileges: SeTrustedCredManAccessPrivilege

Commonly Abused Windows Token Privileges: SeTrustedCredManAccessPrivilege

SeTrustedCredManAccessPrivilege— Access Credential Manager as a trusted caller

Provides users given this permission the ability to utilize applications or processes to abuse the credential manager in an attempt to grab credentials for other users on the system. This setting is normally exclusively used by the credential manager during Backup and Restore and should not be assigned to other users.

GPO Setting Path

Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment

GPO Setting Name

Access Credential Manager as a trusted caller

Token Privilege

SeTrustedCredManAccessPrivilege

Associated Security Frameworks

Mitre ATT&CK: Credential Access (TA0006)

STIG: V-220956

Windows Logon Session Types: NewCredentials

Logon Type — NewCredentials Used with RunAs or mapping a network drive with alternate credentials. Create a new logon session for the same user but...

READ MORE

Windows Logon Session Types: NetworkCleartext

Logon Type — NetworkCleartext Used to logon with credentials sent in clear text (only possible for certain services).

READ MORE
Beyond the Basics – CIS Benchmarks and Advanced Password Security

Beyond the Basics – CIS Benchmarks and Advanced Password Security

In this part of the Senteon and CIS Webinar Series, Ray Feldman of LastPass continued to highlight the power of aligning CIS Benchmarks with advanced

READ MORE