RTO
Ctrlk
  • Getting Started
  • Command & Control
  • External Reconnaissance
  • Initial Compromise
  • Host Reconnaissance
  • Host Persistence
  • Host Privilege Escalation
  • Elevated Host Persistence
  • Credential Theft
  • Password Cracking Tips & Tricks
  • Domain Reconnaissance
  • User Impersonation
    • User Impersonation
    • Pass the Hash
    • Pass the Ticket
    • Overpass the Hash
    • Token Impersonation
    • Make Token
    • Process Injection
  • Lateral Movement
  • Session Passing
  • Pivoting
  • Data Protection API
  • Kerberos
  • Active Directory Certificate Services
  • Group Policy
  • MS SQL Servers
  • Domain Dominance
  • Forest & Domain Trusts
  • Local Administrator Password Solution
  • Microsoft Defender Antivirus
  • Application Whitelisting
  • Data Hunting & Exfiltration
  • Extending Cobalt Strike
Powered by GitBook
On this page

User Impersonation

User ImpersonationPass the HashPass the TicketOverpass the HashToken ImpersonationMake TokenProcess Injection
PreviousADSearchNextUser Impersonation

Last updated 2 years ago