Windows Security: Abusing Access Tokens | A Practical CTF Walkthrough
ToxSec | Exploit misconfigured access tokens to impersonate SYSTEM and own the THM box.
Feb 18, 2024
0x00 Introduction
This Windows box is a clean lesson in chaining web-to-system exploitation. Jenkins gave us the foothold. Nishang and Meterpreter c...
toxsec.hashnode.dev5 min read