. 15952 Windows Access Tokens – A Penetration Er’s Guide
User Manual: Pdf
Open the PDF directly: View PDF
Page Count: 29
- 1 Abstract
- 2 Introduction
- 3 Post-Exploitation
- 4 Windows Access Tokens: An Overview
- 5 Token Abuse
- 6 Tool Requirements for Penetration Testing
- 7 Incognito – Practical Exploitation
- 8 Unexpected Exposure
- 9 Locating Tokens on a Network
- 10 Targeted Penetration Testing Methodology
- 11 Evidence of Organisational Exposure to Token Abuse
- 12 Defence
- 13 Conclusion
- 14 References