Skip to main content

User Privileges

Abuse cases for user-assigned Windows privileges.

📄️ SeImpersonate/SeAssignPrimaryToken

SeImpersonatePrivilege allows a process to impersonate another user, enabling privilege escalation if a high-privilege token is accessible. SeAssignPrimaryTokenPrivilege lets a process assign an arbitrary token to a new process, allowing privilege manipulation. These privileges are often abused in Windows privilege escalation techniques like JuicyPotato, RoguePotato, and PrintSpoofer. Exploiting them can grant SYSTEM-level access from a low-privileged account.

📄️ SeTakeOwnershipPrivilege

SeTakeOwnershipPrivilege is a user rights assignment in Windows that allows a user to take ownership of any object, such as files, directories, or registry keys. This privilege is typically assigned to administrators or system accounts, granting them the ability to change the ownership of objects even if they do not have explicit permissions. It is a powerful privilege often used for system maintenance or recovery tasks. Misuse of this privilege can lead to security risks, as it bypasses standard access control mechanisms.