Windows Access Tokens
Learn what Windows access tokens are, how they can be created, manipulated, and abused by attackers.
This course is intended for those looking to dig deeper into the realm of Windows Access Tokens and how they are abused by attackers.
Understand what access tokens are and how they relate to logon sessions.
Enumerate, duplicate, create, modify, and impersonate access tokens.
Abuse access tokens to impersonate users on local and remote systems.
Introduction
FREE PREVIEWHow to use this course
Before we begin...
Logon Sessions
FREE PREVIEWAccess Tokens
Token Types
Token Privileges
Restricted Tokens
Credential Cache
Token User
FREE PREVIEWToken Statistics
Token Origin
Token Integrity Level
Token Elevation & Elevation Type
Linked Tokens
Token Privileges
Enumerating Other Processes
Adjusting Token Privileges
FREE PREVIEWCreating Tokens
Duplicating Tokens
Stealing Tokens
Impersonating Tokens
Starting Processes
UAC Bypass
Words on PTH and PTT
More resources for you
Before you go...
This course assumes that students have a good working knowledge of C# fundamentals. The C# for n00bs course may be a good place to start.