Windows Access Tokens for Red Teamers
- Tokens intro
- Enumeration
- Adjusting privileges
- Finding vulnerable handles
- Exploiting vulnerable handles
- Abusing various privileges
much more
About Us
PointerSec offers affordable cybersecurity courses and certifications. We also provide free cybersecurity education through our youtube channel "Tech69" which contains 700+ videos on most of offensive security topics.
We focus mainly on Offensive Security topics like Pentesting, Red Teaming, Malware Development, Reverse engineering, etc.
Example Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Enumerating Username, Domainname and SID from token (36:22)
- Enumerating Groups and their SIDs from token (19:39)
- Enumerating Privileges from the token (16:42)
- Enumerating token's owner, type (13:05)
- Enumerating token id, authid, token type, impersonation level (5:30)
- Enumerating logonsessions and logonsessiondata (3:51)
- Enumerating token integrity level (3:47)
- Enumerating logon sessions (14:59)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Explore our other awesome courses
Check your inbox to confirm your subscription