Course Outcomes
- Learn about windows access tokens
- Learn how to enumerate token information using windows api
- Learn how to exploit vulnerable token handles
- Learn how to adjust privileges
- Learn how to exploit SeImpersonate, SeTCB Privileges
Course Structure
17 lectures • 6h 20m total duration
About This Course
This course dives into the intricacies of Windows access tokens, focusing on their role in security and how they can be exploited for penetration testing. Ideal for Red Teamers, Security Consultants, and Malware Developers, this course provides a comprehensive understanding of how access tokens work within the Windows operating system.
If you're interested in the technical aspects of Windows security and how access tokens can be leveraged for penetration testing, this course is for you. It offers a practical approach to understanding and exploiting access tokens, making it a valuable resource for anyone looking to enhance their security testing skills.
Used by learners at
Course Requirements
- Basics of windows api can be advantage but not mandatory
Course Instructor
Includes Certificate of Completion
Add this credential to your LinkedIn profile, resume, or CV. You can share it on social media and in your performance review.
What's in the course?
- 15 video lectures
- 7+ hours of content
- GPT-4 level AI assistance
Upgrade to a Pro account and unlock more courses for accelerated learning. Instant feedback, interactive learning and more.
Free
- 100+ coding courses
- Certificate of completion
- Hands-on practice
- 24x7 doubt solving with AI
- 100+ projects to practice
- In-depth project feedback
- AWS cloud sandboxes
Pro
- 100+ coding courses
- Certificate of completion
- Hands-on practice
- 24x7 doubt solving with AI
- 100+ projects to practice
- In-depth project feedback
- AWS cloud sandboxes