Subscribe via feed.

Microsoft Windows NtImpersonateAnonymousToken LPAC To Non-LPAC Privilege Escalation

Posted by deepcore on January 12, 2018 – 7:17 am

On Microsoft Windows, when impersonating the anonymous token in an LPAC the WIN://NOAPPALLPKG security attribute is ignored leading to impersonating a non-LPAC token leading to privilege escalation.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.