Access Token Manipulation
Adversaries may modify access tokens to operate under a different user or system security context.
Description
Adversaries may modify access tokens to operate under a different user or system security context.
Available Mitigations
This technique can be mitigated using 3 documented security measures.
Active Directory ConfigurationPrivileged Account ManagementPrivileged Process Integrity
Quick Info
- Technique ID
- T1134
- Tactic
- Priv Esc
- Sub-Techniques
- 5
- Mitigations
- 3
