8000 GitHub - asdulp/impersonator: C++ code to impersonate a Windows token and spawn a new process.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

asdulp/impersonator

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Impersonator

Image

Simple C++ code to impersonate the lsass.exe primary token and spawn a new process as NT Authority\SYSTEM . The SeImpersonate and SeDebug privileges are required to impersonate another process token.

Enumerate

C:\Target\>whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name                            Description                                                        State
========================================= ================================================================== ========
...
SeDebugPrivilege                          Debug programs                                                     Disabled
...
SeImpersonatePrivilege                    Impersonate a client after authentication                          Enabled
...

Compile the code

C:\Dev\>compile.bat

Or download the release: https://github.com/plackyhacker/impersonator/releases/tag/v1.0.0-release

Run the binary

C:\Target\>impersonator.exe reverse_shell.exe

About

C++ code to impersonate a Windows token and spawn a new process.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C++ 97.7%
  • Batchfile 2.3%
0