NativeTokenImpersonate - Token Impersonation using only NTAPIs

Tool to impersonate users by stealing their tokens using only NTAPI functions. It supports two types of impersonation, one similar to CreateProcessWithToken and the other to ImpersonateLoggedOnUser.

It also enumerates process information and includes the capability to remap the ntdll.dll library creating a suspended process, again using only NTAPI functions.

Repository: https://github.com/ricardojoserf/NativeTokenImpersonate


The high-level overview for stealing tokens creating a new process (like CreateProcessWithToken):

esquema

For impersonating a user without a new process, altering the main thread of the parent process (like ImpersonateLoggedOnUser):

esquema2

And for listing processes or SIDs:

esquema3

It uses other NTAPI functions for other tasks:

  • NtOpenProcessToken and NtAdjustPrivilegesToken: Enable privileges.

  • RtlInitUnicodeString, RtlUnicodeStringToAnsiString and RtlConvertSidToUnicodeString : Manage strings.

  • RtlAllocateHeap and RtlFreeHeap: Manage heap memory.

  • RtlCreateProcessParametersEx and RtlDestroyProcessParameters: Manage Process Parameters.

  • NtClose: Close object handles.


Please note that:

  • It seems it is not possible to translate the SID to a username with ntdll.dll functions, but it can be quickly translated using wmic or Powershell.

  • The user needs to hold the SeAssignPrimaryTokenPrivilege privilege to steal a token and create a new process, check the “Common errors” section for more details. For the second type of impersonation it is enough with SeDebugPrivilege and SeImpersonatePrivilege.

  • To eliminate the need for LookupPrivilegeValue from Kernel32.dll, the LUID values of SeAssignPrimaryTokenPrivilege, SeDebugPrivilege and SeImpersonatePrivilege are hardcoded.

  • The program only uses LoadLibraryA("ntdll") and GetProcAddress(hNtdll, "NtReadVirtualMemory") from Kernel32.dll to initialize the rest of the function addresses. I guess you can hardcode this one :)

  • It is probably better to use indirect syscalls instead of remapping ntdll, but it was more simple for the PoC.



Steal token (creating a new process)

NativeTokenImpersonate.exe -pid <PID> [-bin <BINARY>] [-args <ARGUMENTS>] [-remap] [-system]
  • -pid: PID of the process to impersonate.

  • -bin: Binary path to run (default: “C:\Windows\System32\cmd.exe”).

  • -args: Arguments for the binary (default: None).

  • -remap: Remap the ntdll.dll library (default: False).

  • -system: Skip enabling privileges if already running as SYSTEM (default: False).


Example - Impersonate the user owning the process with PID 16172 and open a Cmd shell:

NativeTokenImpersonate.exe -pid 16172

img1

Example - Impersonate the user owning the process with PID 16172 and run a Powershell command:

NativeTokenImpersonate.exe -pid 16172 -bin c:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -args "whoami; pause"

img2

Example - Remap the ntdll.dll library, impersonate the user owning the process with PID 16172 and open a Powershell shell:

NativeTokenImpersonate.exe -pid 16172 -remap -bin c:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

img3



Steal token (using the same thread)

NativeTokenImpersonate.exe -thread -pid <PID> [-remap] [-system] [-rev2self]
  • -thread: Impersonate at thread level. If not used, it will spawn a new process.

  • -pid: PID of the process to impersonate.

  • -remap: Remap the ntdll.dll library (default: False).

  • -system: Skip enabling privileges if already running as SYSTEM (default: False).

  • -rev2self: Revert token to its default value, like RevertToSelf (default: False).


Example - Impersonate the user owning the process with PID 5552 at thread level, skipping enabling privileges because SYSTEM already has them. In this case, the results from “whoami” are the same but it is possible to access a file only readable by the low-privileged user:

NativeTokenImpersonate.exe -thread -pid 5552 -system

img4

Example - After impersonation, if you were not running as SYSTEM you may need to restore the original security context of the thread:

NativeTokenImpersonate.exe -rev2self

img4b



List processes

NativeTokenImpersonate.exe -proc [-filter <FILTER>] [-remap]
  • -filter: Filter processes containing this value (default: None).

  • -remap: Remap the ntdll.dll library (default: False).


Example - Print all processes:

NativeTokenImpersonate.exe -proc

img5

Example - Remap the ntdll.dll library and print all processes containing the string “winlo”:

NativeTokenImpersonate.exe -proc -filter winlo -remap

img6



List SIDs

NativeTokenImpersonate.exe -sids [-filter <FILTER>] [-remap]
  • -filter: Filter SIDs containing this value (default: None).

  • -remap: Remap the ntdll.dll library (default: False).


Example - Print all the SIDs:

NativeTokenImpersonate.exe -sids

img7

Example - Remap the ntdll.dll library and print the SIDs containing the string “S-1-5-9”:

NativeTokenImpersonate.exe -sids -filter S-1-5-9 -remap

img8



Common errors

If you are not running as administrator you might find this error:

img9

If you are running as administrator but the user does not hold the SeAssignPrimaryTokenPrivilege, it is not possible to create a new process with the duplicated token (at least with this tool). You can add the privilege to the user using “secpol.msc” in “Security Settings” > “Local Policies” > “User Rights Assignment” > “Replace a process level token”.

As an alternative, you can try the second type of impersonation (using the -thread flag) which requires the more common SeDebugPrivilege and SeImpersonatePrivilege privileges:

img10



References


Written on April 2, 2025