πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
    • AV Evasion
    • Active Directory
    • C2 Frameworks
      • THIS APPLIES TO ALL C2 FRAMEWORKS BUT MAY DIFFER ONLY IN WORDING
      • Reddit C2
      • Cobalt Strike
      • Koadic
      • Powershell Empire
      • Sliver
        • Aliases and Extensions
        • Anti-virus Evasion
        • Architecture
        • Armory
        • Audit Log
        • BOF and COFF Support
        • C2 Advanced Options
        • Sliver C2 Cheatsheet
        • DNS C2
        • Daemon Mode
        • GPG Public Key
        • Sliver Command and Control
        • Sliver C2
        • Watchtower
        • Lateral Movement
        • Techniques
          • AD Enumeration
          • AD Exploitation
          • AD Lateral Movement
          • Bypasses
          • Credentials Dumping
          • Initial Foothold
          • Installation
          • Lateral Movement
          • MSSQL
          • Pivoting
          • Privilege Escalation
          • Privileged User - Post-Exploitation
          • Token Creation and Stealing
            • $cred in pwsh
            • Make-token
            • Metasploit
            • Mimikatz
            • Netexec
            • Pass-the-Hash PtH
            • Rubeus createnetonly
            • Runas
            • SharpImpersonation
            • SharpNamedPipePTH
            • Steal Token
    • Data Manipulation
    • Exploitation Frameworks
    • Fuzzers
    • Miscellaneous
    • Network Scanners
    • Network Sniffers
    • OSINT
    • Password Crackers
    • Phishing Campaigns
    • Scripting Languages
    • Vulnerability Scanners
    • Web Applications
    • Wireless
    • Enumeration
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Toolschevron-right
  2. C2 Frameworkschevron-right
  3. Sliverchevron-right
  4. Techniques

Token Creation and Stealing

$cred in pwshchevron-rightMake-tokenchevron-rightMetasploitchevron-rightMimikatzchevron-rightNetexecchevron-rightPass-the-Hash PtHchevron-rightRubeus createnetonlychevron-rightRunaschevron-rightSharpImpersonationchevron-rightSharpNamedPipePTHchevron-rightSteal Tokenchevron-right
PreviousRestarting the machinechevron-leftNext$cred in pwshchevron-right

Last updated 5 months ago