Potatoes
A Black Hat 2015 presentation by James Forshaw began to mainstream a Windows privesc technique that abused SeAssignPrimaryToken/SeImpersonate permissions; https://www.youtube.com/watch?v=QRpfvmMbDMg. Proof of concept exploits that soon became publicly distributed included Rotten Potato, Juicy Potato, Print Spoofer, and more.

At its core, each of these exploits MITM’ed a handshake between the SYSTEM and an another process to gain access to a security token.

Armed with both (1) access to a privileged security token and (2) SeImpersonatePrivelege, an attacker can initiate a new process with increased privileges.

See excellent detailed writeup: https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/#impersonation-privileges