Security News > 2017 > March > Hijacking Windows user sessions with built-in command line tools (Help Net Security)
Did you know that by using built-in command line tools, any user with system rights and permissions (usually a local administrator) can hijack the session of any logged-in Windows user without knowing that user’s password? He or she can perform the action if they have physical access to the target’s machine, but also remotely via Remote Desktop Protocol (RDP). The capability is not exactly secret, as it has been pointed out by a French security … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Mr82B7ZQ9HQ/
Related news
- SOC teams are frustrated with their security tools (source)
- Windows 10 KB5044273 update released with 9 fixes, security updates (source)
- Week in review: Microsoft fixes two exploited zero-days, SOC teams are losing trust in security tools (source)
- Best AI Security Tools: Top Solutions, Features & Comparisons (source)
- Microsoft blames Windows Server 2025 automatic upgrades on 3rd-party tools (source)
- Microsoft plans to boot security vendors out of the Windows kernel (source)
- Microsoft announces new and improved Windows 11 security features (source)
- Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity (source)