ToxSec AI - Artificial Intelligence Security

ToxSec AI - Artificial Intelligence Security

Windows Security: Abusing Access Tokens | A Practical CTF Walkthrough

ToxSec | Exploit misconfigured access tokens to impersonate SYSTEM and own the THM box.

ToxSec's avatar
ToxSec
Feb 18, 2024
∙ Paid
ToxSec THM Runbook for Jenkins

0x00 Introduction

This Windows box is a clean lesson in chaining web-to-system exploitation. Jenkins gave us the foothold. Nishang and Meterpreter carried the shell. And Windows access tokens — specif…

User's avatar

Continue reading this post for free, courtesy of ToxSec.

Or purchase a paid subscription.
© 2026 Christopher Ijams · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture