Token Impersonation
Overview
What are Tokens?
Definition
Token Types
Delegate Tokens
Impersonate Tokens
Token Discovery and Enumeration
Using Incognito (Metasploit)
Using PowerShell
Token Impersonation Techniques
Method 1: Incognito (Metasploit)
Method 2: Manual Token Manipulation
Practical Attack Scenarios
Scenario 1: Post-Kerberoasting Token Hunt
Scenario 2: Complete Token Impersonation Workflow
Scenario 3: Real-World Token Enumeration
Scenario 4: Post-Impersonation Actions and Limitations
Understanding Token Limitations
Common Limitations After Impersonation
Next Steps When Access Denied
Token Hunting Strategies
PowerShell Token Hunting Script
Token Priority Matrix
Advanced Token Techniques
Token Stealing with Cobalt Strike
Potato Attacks for Token Impersonation
Token Persistence
Method 1: Schedule Task with Token
Method 2: Service Creation
Detection and Evasion
Token Impersonation Detection
Evasion Techniques
Tool Reference
Native Windows Tools
Third-Party Tools
PJPT Exam Tips
For the PJPT Exam
Last updated