Security News > 2017 > March > Hijacking Windows user sessions with built-in command line tools (Help Net Security)
Did you know that by using built-in command line tools, any user with system rights and permissions (usually a local administrator) can hijack the session of any logged-in Windows user without knowing that user’s password? He or she can perform the action if they have physical access to the target’s machine, but also remotely via Remote Desktop Protocol (RDP). The capability is not exactly secret, as it has been pointed out by a French security … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Mr82B7ZQ9HQ/
Related news
- Best CSPM Tools 2025: Top Cloud Security Solutions Compared (source)
- Best SIEM Tools: Top Solutions for Enhanced Security (source)
- New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools (source)
- Windows 11 installation media bug causes security update failures (source)
- Windows 11 Media Update Bug Stops Security Updates (source)
- Windows 10 users urged to upgrade to avoid "security fiasco" (source)
- Security pros baited with fake Windows LDAP exploit traps (source)
- 7-Zip fixes bug that bypasses Windows MoTW security warnings, patch now (source)