11 lines
598 B
Markdown
11 lines
598 B
Markdown
|
|
## Token Impersonation
|
|
|
|
What are tokens?
|
|
- Temporary keys that allow you access to a system/network without having to provide credentials each time you access a file. Think cookies for computers.
|
|
|
|
Two types:
|
|
- Delegate: Created for logging into a machine or using Remote Desktop
|
|
- Impersonate: "non-interactive" such as attaching a network drive or a domain logon script
|
|
|
|
-- Need to load psexec through Metasploit first. ---> https://southeasttech-my.sharepoint.com/personal/tyler_ramsbey_southeasttech_edu/Documents/Notebooks/Hacking%20Notebook/Hacking%20Notebook/Active%20Directory.one |