logohdlogohd

  • / news
  • / infosec
  • / dummies
  • / tools
  • / tweaks
  • / opinions
  • / fbgrp

logohd

  1. Home
  2. News
  3. Windows: Highest level of access to the network without password

Windows: Highest level of access to the network without password

19/03/2017, 15:25
News

Windows Feature or Defects? Alexander Korznikov, a security researcher, has published a way to help you get the highest level of access to a network without the need for a password.

The researcher reported in a blog post that a privileged user, such as a local administrator with system privileges, can use the command line to hijack at a session of another logged-in user who has higher privileges.

Windows

Korznikov said his technique is not only to gain access to an account with higher privileges, but can also be used by system administrators to access accounts with lower entitlements.

The researcher says:

"A bank clerk has access to a billing system and its credentials to be able to connect. One day, he started using the billing system and during the break, he locked his job. The system administrator can then log in to the employee's workstation. According to the bank's policy, the administrator should not have access to the billing system, but with two built-in commands in Windows, the administrator can hijack the account of the employee, who is still locked. This way, the administrator can perform malicious actions on the billing system through the employee's account. ”

All it takes is about half a minute, according to the PoC video published by the researcher.

  First PS4, a small difference from Xbox One

https://www.youtube.com/watch?v=VytjV2kPwSg

Korznikov said he tested the bug on Windows 7, Windows 10, Windows Server 2008, and Windows Server 2012 R2, and runs on any supported version of Windows.

Korznikov did not report the matter to Microsoft.

"Everything is done with built-in commands. "Any administrator can emulate any logged-in user either locally with physical access or remotely via Remote Desktop," he said.

"Reporting to Microsoft could take six months to resolve the issue, and I wanted to let them all know as soon as possible."

A Microsoft spokesman said the alleged flaw "is not a security vulnerability as it requires local administrator privileges on the machine."

Feature or defect? The researcher himself has given as a title to his publication “0-day or Feature? Privilege Escalation / Session Hijacking All Windows versions. ” Whether it is or the usefulness of the PoC you attended will be judged by you.
However, if you think of the scenario with the bank described by the researcher, it may well be malicious actions without the consent of the account holder.

  Tutanota Encrypted Open Source communication

0-day or Feature

Registration in iGuRu.gr via email

Your email for sending each new post

Follow us on Google News iGuRu.gr at Google news

Share this
  • Facebook
  • Twitter
  • Reddit
  • E-mail
  • giorgos
  • Latest posts

George still wonders what he's doing here ...

  • ForceDelete Delete files that cannot be deleted
  • Kali Linux 2022.2 has just been released
  • uWall make hidden partitions on USB
  • 100.000 sites collect what you type before you click Submit
View all

Leave a reply Ακύρωση απάντησης

Your email address Will not be published.

  + 47 = 53

tags:

  • 2008
  • 2012
  • alexander
  • blog
  • desktop
  • hijack
  • hijacking
  • https
  • I'm sure
  • login
  • Microsoft
  • Password
  • POC
  • remote
  • server
  • Session
  • windows
  • Windows 7
  • Windows Server
  • youtube
  • security
  • video
  • line
  • network
  • version
  • code
  • account
  • access
  • system
Previous Story

Super Mario Run comes on Android at 23 March

Next Story

New System Rescue CD 4.9.4

logo cl

© 2022 · ☢ · Keep It Simple Stupid theme

  • / about
  • / contact
  • / rss
  • / sitemap
  • / tos
  • / depositphotos
  • / news
  • / infosec
  • / dummies
  • / tools
  • / tweaks
  • / opinions
  • / fbgrp