Token Impersonation — PrintSpoofer
For this exploit to work, we need local service or network service access and with SeImpersonatePrivilege or SeAssignPrimaryTokenPrivilege enabled.
Enumeration
We are going to exploit SeImpersonatePrivilege to escalate our privileges to SYSTEM. For this to work, we need local service with either SeImpersonatePrivilege or SeAssignPrimaryTokenPrivilege enabled. Let’s examine it

As you can see, we have local service account here. Let’s examine the privileges.

Well.. SeImpersonatePrivilege is enabled, which means we can abuse it to escalate our privilege.
Exploitation
We will use printspoofer.exe to abuse the privilege.

Well…As you can see, we have obtained cmd with SYSTEM privilege.