← Back to Glossary
Token Impersonation
A Windows attack technique where an attacker steals or duplicates access tokens of other users to impersonate them and access their resources.
A Windows attack technique where an attacker steals or duplicates access tokens of other users to impersonate them and access their resources.