Process is No One Hunting for Token Manipulation

Process is No One Hunting for Token Manipulation

via YouTube Direct link

exclude factors

29 of 31

29 of 31

exclude factors

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Process is No One Hunting for Token Manipulation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Game of Thrones
  3. 3 Jared Atkinson
  4. 4 Robby Winchester
  5. 5 Hypothesisdriven hunting
  6. 6 Pyramid of pain
  7. 7 Tactics Techniques Procedures
  8. 8 How does this apply
  9. 9 The hunt hypothesis process
  10. 10 Case Study Detecting Access Token Manipulation
  11. 11 First Step Tactics
  12. 12 Access Token Manipulation
  13. 13 Windows Authentication
  14. 14 logon session types
  15. 15 token types
  16. 16 token theft
  17. 17 how it works
  18. 18 create process with token
  19. 19 make impersonate token
  20. 20 set thread token
  21. 21 identify collection requirements
  22. 22 collect data points
  23. 23 collect access tokens
  24. 24 get access token
  25. 25 benign impersonation
  26. 26 impersonating system token
  27. 27 ticket granting token
  28. 28 identify scope
  29. 29 exclude factors
  30. 30 exclude techniques
  31. 31 demo

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.