Learning Objectives

This course is intended for those looking to dig deeper into the realm of Windows Access Tokens and how they are abused by attackers.

  • Understand what access tokens are and how they relate to logon sessions.

  • Enumerate, duplicate, create, modify, and impersonate access tokens.

  • Abuse access tokens to impersonate users on local and remote systems.

Course Curriculum

    1. Introduction

      FREE PREVIEW
    2. How to use this course

    3. Before we begin...

    4. Logon Sessions

      FREE PREVIEW
    5. Access Tokens

    6. Token Types

    7. Token Privileges

    8. Restricted Tokens

    9. Credential Cache

    1. Token User

      FREE PREVIEW
    2. Token Statistics

    3. Token Origin

    4. Token Integrity Level

    5. Token Elevation & Elevation Type

    6. Linked Tokens

    7. Token Privileges

    8. Enumerating Other Processes

    1. Adjusting Token Privileges

      FREE PREVIEW
    2. Creating Tokens

    3. Duplicating Tokens

    4. Stealing Tokens

    5. Impersonating Tokens

    6. Starting Processes

    7. UAC Bypass

    8. Words on PTH and PTT

    1. More resources for you

    2. Before you go...

About this course

  • £49.00
  • 27 lessons

FAQ

  • What prerequisite knowledge do I need?

    This course assumes that students have a good working knowledge of C# fundamentals. The C# for n00bs course may be a good place to start.