首页
学习
活动
专区
圈层
工具
发布
    • 综合排序
    • 最热优先
    • 最新优先
    时间不限
  • 来自专栏大内老A

    模拟(Impersonation)与委托(Delegation)

    这就涉及到一个重要的话题——模拟(Impersonation)与委托(Delegation)[实例程序源代码从这里下载] 目录: 一、从访问令牌(Access Token)说起 主令牌(Primary Token):每一个进程都具有一个唯一的主令牌,进行通过主令牌被开启; 模拟令牌(Impersonation Token):在默认的情况下,当线程被开启的时候,所在进程的主令牌会自动附加到当前线程上 模拟等级通过如下所示的SECURITY_IMPERSONATION_LEVEL枚举表示。 1: typedef enum _SECURITY_IMPERSONATION_LEVEL { 2: SecurityAnonymous, 3: SecurityIdentification , 4: SecurityImpersonation, 5: SecurityDelegation 6: } SECURITY_IMPERSONATION_LEVEL, *PSECURITY_IMPERSONATION_LEVEL

    1.9K70发布于 2018-01-16
  • 来自专栏CNCF

    使用RBAC Impersonation简化Kubernetes资源访问控制

    Juanjo Ciarlante在Bitnami上发表 https://docs.bitnami.com/tutorials/simplify-kubernetes-resource-access-rbac-impersonation Add impersonation bindings <members> -> team_user --- #@ ImpersonateCRBinding(team_user, members) --- access-authn-authz/rbac/ https://kubernetes.io/docs/reference/access-authn-authz/authentication/#user-impersonation

    1.8K20发布于 2020-09-22
  • 来自专栏大内老A

    从执行上下文角度重新理解.NET(Core)的多线程编程[3]:安全上下文

    目录 一、SecurityContext 二、让代码在指定Windows账号下执行 三、抑制模拟账号的跨线程传播 四、利用Impersonation机制读取文件 一、SecurityContext 这种策略相当于模拟/假冒了(Impersonate)了指定账号执行了某种操作,所以我们将这种机制称为Impersonation。 我们通过一个简单的例子来演示一下Impersonation机制。 然后针对账号foobar(XU\foobar)创建了对应的模拟上下文(Impersonation Context),并在此上下文中打印出当前Windows账号。 四、利用Impersonation机制读取文件 访问当前账号无权访问的资源是Impersonation机制的主要应用场景,接下来我们就来演示一下基于文件访问的Impersonation应用场景。 "Allowed" : "Denied")).Start(); } Console.WriteLine("Undo impersonation: {0}", CanRead

    72820发布于 2020-12-01
  • 来自专栏大数据-BigData

    Alluxio权限体系

    服务端的配置属性包括:alluxio.master.security.impersonation. <USERNAME>.users 和 alluxio.master.security.impersonation.<USERNAME>.groups。 为了使得用户alluxio_user能够模拟其他用户,你至少需要设置alluxio.master.security.impersonation. <USERNAME>.users和 alluxio.master.security.impersonation. User "yarn" is not configured to allow any impersonation.

    76560编辑于 2023-10-18
  • 来自专栏张善友的专栏

    Blackpearl 的 Impersonate

                    managementServer.UpdateAdminUsers(newAdminPerms); Impersonate方法的调用可以参照K2 blackpearl Client Impersonation impersonated user     ///}     /// </example>     ///     public class Impersonation : IDisposable     {         private IK2Connection _conn = null;         private Impersonation <param name="conn">代表K2服务器链接</param>         /// <returns></returns>         public static Impersonation             }             conn.Connection.ImpersonateUser(userName);             return new Impersonation

    62560发布于 2018-01-31
  • 来自专栏子云笔记

    exploit/windows/local/cve_2022_21882_win32k

    getsystem[-] priv_elevate_getsystem: Operation failed: 1346 The following was attempted:[-] Named Pipe Impersonation (In Memory/Admin)[-] Named Pipe Impersonation (Dropper/Admin)[-] Token Duplication (In Memory/Admin) [-] Named Pipe Impersonation (RPCSS variant)[-] Named Pipe Impersonation (PrintSpooler variant)[-] Named Pipe Impersonation (EFSRPC variant - AKA EfsPotato)meterpreter > background[*] Backgrounding session

    58320编辑于 2022-08-17
  • 来自专栏FreeBuf

    安全研究 | 如何使用Pytmipe实现Windows上的令牌篡改和提权

    88 88 YY 88 88 88 888888 ------------------------------------------- Token Manipulation, Impersonation primary token of selected pid and try to spawn cmd.exe imptoken impersonate primary or impersonation parent PID Spoofing ("handle inheritance)" impuser create process with creds with impersonation ] - PID: 2288 ------------------------------ - PID: 2288 - type: Impersonation (2) - token printLinked=False) imp.terminateImpersonation() print("Current Effective token for current thread (impersonation

    1.3K20发布于 2021-01-08
  • 来自专栏张善友的专栏

    What is aspnet.config

    You may know when you are impersonating and you spawn a new thread, the impersonation token will not Microsoft decided to change this for managed apps to what you would actually expect - by default the impersonation This will always show the process identity name regardless of impersonation settings.

    2.2K90发布于 2018-01-30
  • 来自专栏大内老A

    模拟在WCF中的应用

    在《模拟(Impersonation)与委托(Delegation)》一文中,我们对模拟和委托这两个概念以及相关编程实现进行了详细说明。 一、命令式模拟编程 如果我们有一个具有模拟级别为Impersonation或者Delegation的WindowsIdentity,我们就可以通过调用其Impersonate对其进行身份模拟。 OperationBehaviorAttribute : Attribute, IOperationBehavior 3: { 4: //其他成员 5: public ImpersonationOption Impersonation { 9: NotAllowed, 10: Allowed, 11: Required 12: } 通过OperationBehaviorAttribute的Impersonation

    1.1K100发布于 2018-01-16
  • 来自专栏c#开发者

    .net下模拟不同身份登陆以获取不同权限

    SetLastError=true)]  public extern static bool DuplicateToken(IntPtr ExistingTokenHandle,  int SECURITY_IMPERSONATION_LEVEL (  strLogin,  strDomain,  strPwd,  (int)logonType,  (int)logonProvider,  ref tokenHandle);  // Did impersonation error code : {0}", ret);  throw new ApplicationException(strErr, null);  }  // Get identity before impersonation token that is passed to the following constructor must  // be a primary token in order to use it for impersonation undoImpersonation();     }     else     {         //Your impersonation failed. 

    1.2K120发布于 2018-04-13
  • 来自专栏全栈工程师修炼之路

    PS网络管理与配置常用命令

    | Connect | Call | Packet | PacketIntegrity | PacketPrivacy | Unchanged}] [-Delay <System.Int32>] [-Impersonation Running") {$Results = Receive-Job $job} # 6.用凭据Ping远程计算机 # 该命令使用Credential参数指定有权ping远程计算机的用户帐户,并使用Impersonation Test-Connection Server55 -Credential Domain55\User01 -Impersonation Identify # 7.仅当连接测试成功时才创建会话 if

    76230编辑于 2022-09-29
  • 来自专栏数据库相关

    SQLServer的sys.dm_audit_actions表说明

    CASCADEEXEXECUTEFTFULLTEXTFTGFULLTEXT_GROUPGGRANTGRDBDATABASE_PERMISSION_CHANGE_GROUPGRDODATABASE_OBJECT_PERMISSION_CHANGE_GROUPGROSCHEMA_OBJECT_PERMISSION_CHANGE_GROUPGRSOSERVER_OBJECT_PERMISSION_CHANGE_GROUPGRSVSERVER_PERMISSION_CHANGE_GROUPGWGGRANT WITH GRANTIMDPDATABASE_PRINCIPAL_IMPERSONATION_GROUPIMPIMPERSONATEIMSPSERVER_PRINCIPAL_IMPERSONATION_GROUPININSERTLGBBROKER

    16310编辑于 2025-07-10
  • 来自专栏红队蓝军

    域内令牌窃取

    TOKEN_INFO->token_handle, TokenImpersonationLevel, NULL, 0, &returned_tokimp_length)) { PSECURITY_IMPERSONATION_LEVEL TokenImpersonationInformation = (PSECURITY_IMPERSONATION_LEVEL)GlobalAlloc(GPTR, returned_tokimp_length TokenImpersonationInformation, returned_tokimp_length, &returned_tokimp_length)) { if (*((SECURITY_IMPERSONATION_LEVEL if (integrity_level < SECURITY_MANDATORY_HIGH_RID) { printf("Low privilege, cannot use the impersonation dwDesiredAccess, [in, optional] LPSECURITY_ATTRIBUTES lpTokenAttributes, [in] SECURITY_IMPERSONATION_LEVEL

    1.6K20编辑于 2023-02-25
  • 来自专栏FreeBuf

    WiFi-Pineapple-MK7_REST-Client:一款功能强大的WiFi安全渗透测试工具

    pineap_filtering.clear_clients() pineap_filtering.ssid_filter( (string) 'allow' | 'deny' ) (向右滑动,查看更多) 身份伪造方法: pineap_impersonation = PineappleMK7::Modules::PineAP::Impersonation.new pineap_impersonation.output() pineap_impersonation.add_ssid ( (string) ssid ) pineap_impersonation.clear_pool() (向右滑动,查看更多) 设置访问/方法: pineap_settings = PineappleMK7

    77110编辑于 2023-11-30
  • 来自专栏Khan安全团队

    不要将 SYSTEM 令牌用于沙盒

    现在尝试模拟令牌并检查所分配的模拟级别是:PS> Invoke-NtToken $t {$(Get-NtToken -Impersonation -Pseduo).ImpersonationLevel} 模拟 我们可以看到最后一行将模拟级别显示为Impersonation。 t = Get-NtToken -Duplicate PS> Set-NtTokenIntegrityLevel High PS> Invoke-NtToken $t {$(Get-NtToken -Impersonation

    91310编辑于 2022-01-18
  • 来自专栏网络安全攻防

    CVE-2021-1732:Windows Win32k提权

    The following was attempted: [-] Named Pipe Impersonation (In Memory/Admin) [-] Named Pipe Impersonation (Dropper/Admin) [-] Token Duplication (In Memory/Admin) [-] Named Pipe Impersonation (RPCSS variant)

    1.5K00发布于 2021-03-27
  • 来自专栏Harvey

    当输入getsystem会发生什么?

    (Default to '0'). 0 : All techniques available 1 : Service - Named Pipe Impersonation (In Memory/Admin) 2 : Service - Named Pipe Impersonation (Dropper/Admin) 3 :

    50210编辑于 2022-08-10
  • 来自专栏Gamma安全实验室

    当输入getsystem会发生什么?

    (Default to '0'). 0 : All techniques available 1 : Service - Named Pipe Impersonation (In Memory/Admin) 2 : Service - Named Pipe Impersonation (Dropper/Admin) 3 : Service

    1.2K30发布于 2020-12-23
  • 来自专栏大内老A

    谈谈基于Kerberos的Windows Network Authentication[下篇]

    3.对Delegation的支持 Impersonation和Delegation是一个分布式环境中两个重要的功能。 Impersonation允许Server在本地使用Logon 的Account执行某些操作,Delegation需用Server将logon的Account带入到另过一个Context执行相应的操作。 NTLM仅对Impersonation提供支持,而Kerberos通过一种双向的、可传递的(Mutual 、Transitive)信任模式实现了对Delegation的支持。

    85480发布于 2018-02-08
  • 来自专栏c#开发者

    windows logon API

                    }                 ////Check the identity                 //Console.WriteLine("Before impersonation                 //         WindowsIdentity.GetCurrent().Name);                 //Create a WindowsIdentity from the impersonation

    1.2K40发布于 2018-04-12
领券