Windows Abused Privileges
Windows Abused Privileges
Windows Abused Privileges
Replace a process-level token. Generate security audit. Backup file and directories. Bypass traverse checking. Create global objects. Create a pagefile. Create permanent shared objects.
Checked by various components, such Required to generate events for the Grant the following access to any file Avoid checking permissions on Required for a process to create Checked by NtCreatePagingFile, which Checked by the object manager when
as NtSetInformationJobObject, that Security event log with the or directory: READ_CONTROL, intermediate directories of a section and symbolic link objects in is the function used to create a new creating a permanent object.
set a process’s token.. ReportEvent API. ACCESS_SYSTEM_SECURITY, multilevel directory lookup. the directories of the object manager paging file.
FILE_GENERIC_READ, FILE_TRAVERSE. namespace.
Create symbolic links. Create a token object. Perform volume maintenance tasks. Enable computer and user accounts to Impersonate a client after Increase scheduling priority. Adjust memory quotas for a process.
be trusted for delegation. authentication.
Checked by NTFS when creating Checked by NtCreateToken to create Enforced by file system drivers during Checked by the process manager and Enforced when changing a process’s
symbolic links with the a token object. a volume open operation, which is Used by Active Directory services to Process manager checks for this is required to raise the priority of a working set thresholds, a process’s
CreateSymbolicLink API. required to perform disk-checking. delegate authenticated credentials. when a thread wants to use a token process. paged and nonpaged pool quotas, and
for impersonation. a process’s CPU rate quota.
Required to call
SetProcessWorkingSetSize to increase
the minimum working set.
Checked by NtLoadDriver and
NtUnloadDriver driver functions. Windows Privileges Checked by NtLockVirtualMemory, the
kernel implementation of VirtualLock.
Checked by the SAM on a domain
controller when creating a machine
account in a domain.
Shutdown the system. Manage auditing and security log. Restore files and directories. Synchronize directory service data. Modify firmware environment variables. Profile system performance. Change the system time.
Grant access to any file or directory, Required by
Checked by NtShutdownSystem and Required to access the SACL of a Required to use the LDAP directory Checked for by NtCreateProfile, the Required to change the time or date.
regardless of the security descriptor NtSetSystemEnvironmentValue and function used to perform profiling of
NtRaiseHardError, which presents a security descriptor and to read and synchronization services. It allows the
that’s present: WRITE_DAC, WRITE_OWNER, NtQuerySystemEnvironmentValue to the system. This is used by the
system error dialog box on the clear the security event log. ACCESS_SYSTEM_SECURITY, holder to read all objects and modify and read firmware
interactive console.. FILE_GENERIC_WRITE, FILE_ADD_FILE, properties in the directory. Kernprof tool, for example.
FILE_ADD_SUBDIRECTORY and DELETE. environment variables using the HAL.