Esc
Access Token Manipulation - T1134
(ATT&CK® Technique)
Definition
Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.