handbook/tools/5.Machine/2.Windows/Notes/REVIEW/Token-Impersonation.md
2024-08-31 01:07:22 +02:00

598 B

Token Impersonation

What are tokens?

  • Temporary keys that allow you access to a system/network without having to provide credentials each time you access a file. Think cookies for computers.

Two types:

  • Delegate: Created for logging into a machine or using Remote Desktop
  • Impersonate: "non-interactive" such as attaching a network drive or a domain logon script

-- Need to load psexec through Metasploit first. ---> https://southeasttech-my.sharepoint.com/personal/tyler_ramsbey_southeasttech_edu/Documents/Notebooks/Hacking%20Notebook/Hacking%20Notebook/Active%20Directory.one