Completed
Impersonation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
A Process is No One - Hunting for Token Manipulation
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What is Hunting
- 3 Normal Hunt Cycle
- 4 Hypothesis Driven Hunting
- 5 Benefits
- 6 HypothesisDriven Hunting
- 7 Hacker Lifecycle
- 8 Mitre Attack Framework
- 9 Tactics Techniques Procedures
- 10 Tactics
- 11 Procedures
- 12 Why is this useful
- 13 What is this process
- 14 Building the hunt hypothesis
- 15 Identifying the tactic
- 16 Identifying the procedures
- 17 Scope
- 18 Documentation
- 19 Conclusion
- 20 Benefit
- 21 Tactics and Techniques
- 22 Access Token Manipulation
- 23 Windows Authentication
- 24 Access tokens
- 25 Token types
- 26 General overview
- 27 Token impersonation
- 28 Visualization
- 29 Create a Process
- 30 Make an Impostor Token
- 31 Create a New logon session
- 32 Collection Requirements
- 33 Collecting Access Tokens
- 34 Get Access Token
- 35 Impersonation
- 36 GetSystem
- 37 Kerberos ticket granting ticket
- 38 Get Kerberos ticket granting ticket
- 39 Make token attack
- 40 Scope of analysis
- 41 Excluded factors
- 42 Demo
- 43 Questions