Course contentsShow
Security
Lesson 2130 of 3,05242. Penetration Testing and Red TeamingPro lesson

Token Manipulation and Impersonation

Stealing and duplicating access tokens, impersonating user contexts, and creating processes with elevated or alternate security contexts.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.