RTO
search
⌘Ctrlk
RTO
  • Getting Started
  • Command & Control
  • External Reconnaissance
  • Initial Compromise
  • Host Reconnaissance
  • Host Persistence
  • Host Privilege Escalation
  • Elevated Host Persistence
  • Credential Theft
  • Password Cracking Tips & Tricks
  • Domain Reconnaissance
  • User Impersonation
    • User Impersonation
    • Pass the Hash
    • Pass the Ticket
    • Overpass the Hash
    • Token Impersonation
    • Make Token
    • Process Injection
  • Lateral Movement
  • Session Passing
  • Pivoting
  • Data Protection API
  • Kerberos
  • Active Directory Certificate Services
  • Group Policy
  • MS SQL Servers
  • Domain Dominance
  • Forest & Domain Trusts
  • Local Administrator Password Solution
  • Microsoft Defender Antivirus
  • Application Whitelisting
  • Data Hunting & Exfiltration
  • Extending Cobalt Strike
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

User Impersonation

User Impersonationchevron-rightPass the Hashchevron-rightPass the Ticketchevron-rightOverpass the Hashchevron-rightToken Impersonationchevron-rightMake Tokenchevron-rightProcess Injectionchevron-right
PreviousADSearchchevron-leftNextUser Impersonationchevron-right

Last updated 2 years ago