Windows Privileges:

Understanding Windows privileges is crucial when targeting local escalation, persistence, and impersonation on Windows systems. This guide breaks down the core privileges in Windows, how they affect security, and how pentesters can abuse them to move from user to SYSTEM — or better.

Privileges are specific rights assigned to users or groups that allow them to perform system-level actions.

  • Unlike permissions (which are object-specific), privileges apply to the system as a whole.
  • They’re managed through Group Policy and stored in each user’s access token.
  • To view your current privileges:
whoami /priv

Each privilege has a name (e.g., SeDebugPrivilege) and a state:

  • Enabled
  • Disabled
  • Removed
  • Allows: Attaching to and manipulating any process (even SYSTEM)
  • Abuse: Dump credentials, steal tokens, manipulate processes
  • Tools: Mimikatz, Process Hacker, PowerShell
  • Enable: mimikatz privilege::debug
  • Privilege Escalation: Token theft, LSASS dumping
  • Allows: Impersonating any token passed to the process
  • Abuse: Token impersonation, PrintSpoofer, Potato exploits
  • Key in: SERVICE exploitation and local privilege escalation
  • Check: whoami /priv should show it as enabled
  • Allows: Assigning tokens to new processes
  • Abuse: Combine with SeImpersonatePrivilege for SYSTEM shell
  • Used in: Custom payloads, scripting abuse
  • Very powerful, allows deep OS integration
  • Rarely assigned, typically to services
  • Used for: Trusted logon sessions, dangerous if misconfigured
  • Allows: Reading any file regardless of ACLs
  • Abuse: Access sensitive files like SAM, SYSTEM, registry hives
  • Tools: reg save, vssadmin, PowerShell
  • Allows: Writing to any file, restoring backups
  • Abuse: Overwrite protected files, modify registry hives
  • Combined with: SeBackup for full file control
  • Allows: Taking ownership of any securable object
  • Abuse: Take ownership of critical files or registry keys, change permissions
  • Command: takeown /F C:\targetfile
  • Allows: Loading unsigned drivers (Ring 0)
  • Abuse: Install kernel-mode backdoors or rootkits
  • Warning: Often causes blue screens if misused
  • Allows: Creating tokens manually
  • Very rare, but extremely dangerous
  • Used in: Custom token crafting (advanced persistence)
  • Allows: Defragmentation, raw disk access
  • Abuse: Read/write raw disk sectors, bypass filesystem protections
  • Used in: Forensic evasion, data hiding
PrivilegeAbuse PotentialTypical Use/Tool
SeDebugPrivilegeToken theft, LSASS dumpMimikatz, Proc Explorer
SeImpersonatePrivilegeSYSTEM shell, Potato chainPrintSpoofer, JuicyPotato
SeAssignPrimaryTokenShell injectionCustom scripts, API abuse
SeTcbPrivilegeFull OS controlRarely exploitable, but deadly
SeBackupPrivilegeRead everythingreg save, vssadmin, PowerShell
SeRestorePrivilegeOverwrite protected filesreg restore, backdoor implantation
SeTakeOwnershipPrivilegeTake file controltakeown, icacls
SeLoadDriverPrivilegeKernel-level backdoorsManual driver loading
SeCreateTokenPrivilegeCraft any tokenManual or advanced attack tools
SeManageVolumePrivilegeRaw disk accessDisk sector read/write, stealth ops
  • whoami /priv
  • Get-TokenPrivs.ps1 (PowerView)
  • Seatbelt.exeSeatbelt -group=all
  • accesschk.exe -p user
  • mimikatz privilege::debug
  • PrintSpoofer.exe
  • JuicyPotato.exe, RoguePotato.exe, SweetPotato.exe
  • Custom PowerShell/C# scripts
  • Classic potato exploit chain → SYSTEM
  • Inject into SYSTEM process → Dump creds
  • Extract SAM and SYSTEM → Crack passwords offline
  • Modify registry keys or service binary ACLs
  • Craft a token → Spawn SYSTEM shell (very rare, but powerful)
  • Always check your current privileges (whoami /priv)
  • Look for service accounts with high privileges
  • Use accesschk.exe to find weak file/service permissions
  • Combine privileges with token abuse or service misconfigurations
  • Build persistence by escalating and modifying privileges

Privileges are quiet but deadly. Most users never notice them — but if you do, and you know how to abuse them, they become one of your sharpest weapons on Windows.

Whether you’re targeting local escalation, persistence, or impersonation, map out your privileges early and plan your attacks accordingly. Like tokens, they’re part of the Windows soul — and they’re yours to master.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top