0xCZR
CtrlK
  • whoami
  • Malware Development
    • PE-Structure
  • PoCs
    • Notepad++ - CVE-2025-49144
  • Knowledge Base
    • Windows and AD
      • Attacks
        • Role Based Constrained Delegation Attack
        • Kerberoasting: From SPNs to Password Cracking
        • Shadow Credential Attack
      • Components
        • Active Directory
          • Lightweight Directory Access Protocol (LDAP)
          • Kerberos
          • Active Directory Certificate Services (ADCS)
          • Active Directory Overview
        • Windows
          • Windows Security Model
            • Windows Security Tokens
          • Windows Data Protection API (DPAPI)
    • Digital Trust
      • From Couriers to Certificates: The Remarkable History of Digital Trust
      • SHA-512
    • Tools
  • Write-Ups
    • Blurry Write-Up - HTB
    • Pandora Write-Up - HTB
    • Support Write-Up - HTB
    • Cicada Write-Up - HTB
    • Timelapse Write-up - HTB
    • Return Write-up - HTB
    • Driver Write-up - HTB
    • Love Write-Up - HTB
    • Administrator Write-up - HTB
    • Certified Write-up - HTB
    • Jab Write-Up - HTB
    • Pov Write-Up - HTB
    • LinkVortex Write-Up - HTB
    • Mailing Write-Up - HTB
    • Manager Write-Up - HTB
    • Broker Write-Up - HTB
    • Puppy Write-Up - HTB
  • CVE-Talk
    • CUPS RCE
  • Kusto Detective Agency
  • LeetCode
  • Cheatsheets
    • Crackmapexec
    • Active Directory Privilege Escalation
    • Credential Hunting in Windows
    • Network Discovery
    • DNS Protocol
    • Enumeration
    • Web Application Discovery
    • Gobuster
    • FFUF
    • Enum4Linux Network Enumeration
    • Performance Optimization
    • Active Directory
    • NMAP Full
    • User Enumeration
    • Password Spraying
    • NBT-NS Poisoning from Linux
    • NBT-NS Poisoning from Windows
    • SMB Services
    • NFS
    • FTP
    • SMTP
    • POP3/IMAP
    • MSSQL
    • MySQL
    • RDP
    • SNMP
    • RPCClient
    • SAM Database
    • NTDS.dit
    • LSASS
    • Kerberos
    • Windows File Transfers
    • Linux File Transfers
    • Living off the Land - File transfers
    • File Transfers - Cheatsheet
    • Shells
    • Upgrade Shells to Fully Interactive
    • Log-in Brute Forcing
    • Medusa
    • Password Attacks
    • Password Spraying - Windows
    • Authentication Mechanisms - Tools
  • Credential Hunting in Linux
  • DNS Protocol
Powered by GitBook
On this page
  1. Knowledge Base
  2. Windows and AD
  3. Components
  4. Windows

Windows Security Model

Windows Security Tokens
PreviousWindowsNextWindows Security Tokens