Esc
Make and Impersonate Token - T1134.003
(ATT&CK® Technique)
Definition
Adversaries may make new tokens and impersonate users to escalate privileges and bypass access controls. For example, if an adversary has a username and password but the user is not logged onto the system the adversary can then create a logon session for the user using the LogonUser function. The function will return a copy of the new session's access token and the adversary can use SetThreadToken to assign the token to a thread.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.