Q
Problem solve Get help with specific problems with your technologies, process and projects.

How is session hijacking possible without passwords?

Local Windows admins can perform session hijacking without passwords. Expert Judith Myerson explains how this type of attack works and what to include in a policy to prevent it.

I've heard local Windows admins can hijack sessions without passwords. How is this possible? What are the best...

ways to stop this kind of session hijacking?

An attacker with local Windows admin privileges can remotely hijack a user's session without knowing the user's password.

If the targeted user has been locked out of his workstation, the attacker can access it anyway. This action requires the attacker to have the NT AUTHORITY/SYSTEM authority. He can check this out with the whoami command. A Remote Desktop Protocol must be set up to connect to the victim's machine.

Before session hijacking begins, the attacker goes to the Task Manager's Users tab to view the status of each user's account. Using the Task Manager is easier than executing a few command lines to get the status. The local admin's account is always active. Console is assigned as the session name. If, for example, the targeted user is a bank employee who discontinued his session before leaving for lunch, the attacker would be unable to connect to the employee's workstation.

After viewing the Task Manager, the attacker brings up the Command Prompt window. The attacker executes one command line to complete the session hijacking. Arguments (parameters or options) for the PsExec command are changed maliciously. The victim's remote session is connected back to the attacker. The attacker returns to the Task Manager. He maliciously gains access to the victim's session. When the victim returns from lunch, he has no way of knowing he was hijacked.

Israeli researcher Alexander Korznikov tested this type of session hijacking attack on Windows 2012 and Windows 2008 servers, as well as on Windows 10 and Windows 7.

To stop this type of session hijacking, a group policy should be established. This policy should include preventing an unprivileged user from gaining local admin rights. The policy should also prevent the local admin from returning a user's remote session.

Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)

Next Steps

Find out how an HTTPS session gets hijacked with the Forbidden attack

Learn how to prevent cross-site scripting session hijacking

Check out more about web application session management issues and how to avoid a hijacking

This was last published in May 2017

Dig Deeper on Emerging cyberattacks and threats

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How does your enterprise protect against an attacker hijacking a session?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close