Access tokens are used by Windows applications to access APIs. An access token contains information like who initiated a process, the app that generated the token and its expiry time.
An attacker can manipulate access tokens to make a process appear to be initiated by some other user account, while in reality the request could have been initiated from the account compromised by the attacker in your network.
Attackers leverage access tokens to escalate privileges from the administrative level to a SYSTEM level to perform malicious activities, and access systems in your network remotely to exploit various system processes to their benefit.
An attacker should have access to a privileged user account to get hold of access tokens of any process in the Windows environment.
The attackers obtain access tokens in one of the following three ways:
An attacker can use the following built-in Windows API functions to copy and use existing tokens of other processes to perform malicious activities:
Attackers can use a duplicated token to create a new process using the CreateProcessWithTokenW() function. This function allows the attackers to create tokens implementing the security context of any user they choose to impersonate.
Attackers can remotely create logon sessions for users if they have the credentials of any user account using the LogonUser() function.They can then obtain a token under the logged in user's security context which they can assign to a thread to run a process.
Note: runas command
Any user can use the runas command and perform operations impersonating other users. This context is often used by system admins, as they login to systems as standard users and further execute administrative processes using runas command.
You can follow the above mentioned best practices and also constantly monitor the activities of users and devices in your network to harden the security framework. It can be quite overwhelming to monitor your perimeter defense device logs, your system logs and privileged and other user activity to mitigate threats in your network. You can use a log management solution to avoid the hassle.
EventLog Analyzer is a log management solution that can collect logs from all your network devices in a centralized location, parse and analyze them. It uses its powerful correlation engine to correlate activities from all parts of your network. It can monitor privileged user activity and generate reports on User Logons, User Logoffs, Failed Logons, Successful User Account Validation, and Failed User Account Validation, to name a few. It can identify anomalous activities and flag them as threats. EventLog Analyzer allows you to configure real-time alerts to notify you via SMS and email in case of an attack.Check out other features of EventLog Analyzer now.
Zoho Corporation Pvt. Ltd. All rights reserved.