Security News > 2017 > March > Hijacking Windows user sessions with built-in command line tools (Help Net Security)

Did you know that by using built-in command line tools, any user with system rights and permissions (usually a local administrator) can hijack the session of any logged-in Windows user without knowing that user’s password? He or she can perform the action if they have physical access to the target’s machine, but also remotely via Remote Desktop Protocol (RDP). The capability is not exactly secret, as it has been pointed out by a French security … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Mr82B7ZQ9HQ/
Related news
- Windows 11 Media Update Bug Stops Security Updates (source)
- Windows 10 users urged to upgrade to avoid "security fiasco" (source)
- Security pros baited with fake Windows LDAP exploit traps (source)
- 7-Zip fixes bug that bypasses Windows MoTW security warnings, patch now (source)
- Hackers use Windows RID hijacking to create hidden admin account (source)
- Microsoft: January Windows security updates break audio playback (source)
- Top 8 Penetration Testing Tools to Enhance Your Security (source)
- Microsoft shares workaround for Windows security update issues (source)