<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>windows Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/windows/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/windows/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 25 Sep 2017 20:49:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Hack a Windows 7/8/10 admin account password with Windows magnifier</title>
		<link>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/</link>
					<comments>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 19:56:38 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=976</guid>

					<description><![CDATA[<p>This exploit takes advantage of the ease of access tool on the login page by 'tricking' windows into launching a fully privileged command prompt by selecting 'make items on the screen larger - magnifier'. By using this method you can simply reset admin admin account password, just by having physical access to the computer.</p>
<p>The post <a href="https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/">Hack a Windows 7/8/10 admin account password with Windows magnifier</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Hack a Windows 7/8/10 admin account password with Windows magnifier</h2>
<p style="text-align: justify;">This exploit takes advantage of the ease of access tool on the login page by &#8216;tricking&#8217; windows into launching a fully privileged command prompt by selecting &#8216;make items on the screen larger &#8211; magnifier&#8217;. By using this method you can simply reset admin account password, just by having physical access to the computer.</p>
<p style="text-align: justify;"><em><strong>Disclaimer:</strong> This is for use on a PC that you own. Breaking into someone else&#8217;s PC is considered a serious crime in most places. If you make a mistake or change something else, your Windows may become a non-boot. If so, just undo whatever you changed outside of the hack shown here, and it will back to normal. Need I say this is for Educational Purposes! You are responsible for your own thoughts and actions.</em></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-977 size-full" title="image-border" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg" alt="" width="581" height="480" srcset="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg 581w, https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier-300x248.jpg 300w" sizes="(max-width: 581px) 100vw, 581px" /></a></p>
<h3><span style="font-family: Bitter, Georgia, serif; font-size: 22px;">1. Launch any OS that allow full access to file system</span></h3>
<p style="text-align: justify;">Here you can use many different linux distros or even a windows disk/usb, as long as you can access the terminal/command prompt, you&#8217;re good. In this case, we are going to use Kali linux distro. Insert CD/DVD into drive and reboot the machine. Start your Live DVD. You may need to go into the BIOS screen and change the boot-up order to CD/DVD drive first, HDD second.</p>
<h3 class="step">2. Navigate to Sys32</h3>
<p style="text-align: justify;">Use the file browser in your Linux environment, navigate to <strong>%windir%/system32/</strong>. You may have to right-click and mount the Windows partition/drive first or use the <a href="http://linux.die.net/man/8/mount.ntfs-3g" target="_blank" rel="nofollow noopener">NTFS-3G command</a>.</p>
<div id="attachment_978" style="width: 761px" class="wp-caption aligncenter"><a href="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg"><img decoding="async" aria-describedby="caption-attachment-978" class="wp-image-978 size-full" title="image-border" src="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg" alt="" width="751" height="506" srcset="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg 751w, https://itblogsec.com/wp-content/uploads/2017/09/kali_01-300x202.jpg 300w" sizes="(max-width: 751px) 100vw, 751px" /></a><p id="caption-attachment-978" class="wp-caption-text">Article is written on a macbook with Windows dual booted, there is Windows instance named as BOOTCAMP.</p></div>
<h3 class="step">3. Rename Magnify.exe</h3>
<p style="text-align: justify;">Find and rename <strong>magnify.exe</strong> (Magnifier file) to <strong>magnify.old</strong>. </p>
<pre class="lang:default decode:true ">mv magnify.exe magnify.old</pre>
<h3><strong>4. Rename <span class="skimlinks-unlinked">cmd.exe</span></strong></h3>
<p style="text-align: justify;">Find and rename <strong><span class="skimlinks-unlinked">cmd.exe</span></strong> to <strong><span class="skimlinks-unlinked">magnify.exe</span></strong>.</p>
<pre class="lang:default decode:true ">mv cmd.exe magnify.exe</pre>
<h3><strong>5. Shut Down Linux &amp; Reboot Windows</strong></h3>
<p style="text-align: justify;">Log out and reboot, remove CD/DVD/USB, and restart into Windows.</p>
<h3><strong>6. Get CMD Prompt Modify Accounts</strong></h3>
<p style="text-align: justify;">When Windows reboots, click on the ease of access button in the bottom left corner<a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier01.png"><img decoding="async" class="aligncenter wp-image-986 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier01.png" alt="" width="179" height="101" /></a></p>
<p style="text-align: justify;">Click the second selection “Make items on the screen larger (Magnifier)” and hit apply.</p>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier02.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-988 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier02.png" alt="" width="300" height="242" /></a></p>
<p style="text-align: justify;">The command prompt should now be in front of you. You now have a system level command prompt. At this point is where you can change the admin password and make any modification to the system using administrator privileges. </p>
<p style="text-align: justify;"><strong>Tip</strong>: <em>You can right-click on <span class="skimlinks-unlinked">cmd.exe</span> and click “Run as administrator” inside of Windows for escalated privileges. To edit files, it would never be allowed at basic admin level (caution). Same goes for any app in Windows right click and make the magic happen.</em></p>
<div id="attachment_990" style="width: 671px" class="wp-caption aligncenter"><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-990" class="wp-image-990 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg" alt="" width="661" height="461" srcset="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg 661w, https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack-300x209.jpg 300w" sizes="(max-width: 661px) 100vw, 661px" /></a><p id="caption-attachment-990" class="wp-caption-text">Type net user to get a list of accounts</p></div>
<p><strong><em>Change Password: </em></strong></p>
<pre class="lang:default decode:true">net user username new_password</pre>
<p style="text-align: justify;"><em>Tip: when you do so, the password changes without prompting you again.</em></p>
<p><strong><em>Add an account: </em></strong></p>
<pre class="lang:default decode:true">net user username password /add</pre>
<p style="text-align: justify;"><em>Tip: If your username has a space, like John Doe, use quotes like “John Doe”.</em></p>
<p><strong><em>Admin that: </em></strong></p>
<pre class="lang:default decode:true ">net localgroup administrators username /add</pre>
<p><strong><em>Delete that: </em></strong></p>
<pre class="lang:default decode:true ">net user username /delete</pre>
<p><strong><em>Remote Desktop Users Group: </em></strong></p>
<pre class="lang:default decode:true">net localgroup Remote Desktop Users username /add</pre>
<p><em><strong>Net User Syntax Reference:</strong></em></p>
<pre class="lang:default decode:true">net user commands 
net user for domain</pre>
<h3><strong>7. Revert back all changes</strong></h3>
<p style="text-align: justify;">Now you should insert your Linux Live CD/DVD/USB and rename the files back to the original names.</p>
<ol>
<li style="text-align: justify;">Repeat Step 1</li>
<li style="text-align: justify;">Repeat Step 2</li>
<li style="text-align: justify;">Rename <span class="skimlinks-unlinked">magnify.exe</span> back to <span class="skimlinks-unlinked">cmd.exe</span></li>
<li style="text-align: justify;">Rename <span class="skimlinks-unlinked">magnify.old</span> back to <span class="skimlinks-unlinked">magnify.exe</span></li>
<li style="text-align: justify;">Log out, take out CD/DVD USB, reboot into Windows</li>
</ol>
<h3>Recommended resources</h3>
<p><a title="Kali Linux" href="https://www.kali.org/downloads/">Kali Linux</a><br />
 <a title="Rufus USB Creator" href="https://rufus.akeo.ie/">Create Live USB Sticks Rufus</a></p>
<h3>Conclusion</h3>
<p style="text-align: justify;">Well, that was how you hack a Windows 7/8/2008/10 administrator account password with Windows Magnifier. This also demonstrates how you could Pwn a machine if you think about it some, have hands on and they have not disabled EoA.  Hope it helps you in some way.</p>
<p><span style="font-size: 10pt;"><strong>source:</strong><a href="https://null-byte.wonderhowto.com" target="_blank" rel="noopener"> https://null-byte.wonderhowto.com</a>, <a href="https://thehacktoday.com" target="_blank" rel="noopener">https://thehacktoday.com</a></span></p>
<p>The post <a href="https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/">Hack a Windows 7/8/10 admin account password with Windows magnifier</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password</title>
		<link>https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/</link>
					<comments>https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 27 Mar 2017 19:46:21 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=788</guid>

					<description><![CDATA[<p>Alexander Korznikov, an Israeli security researcher, has recently demonstrated that a local privileged user can even hijack the session of any logged-in Windows user who has higher privileges without knowing that user's password, using built-in command line tools.</p>
<p>The post <a href="https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/">Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password</h2>
<p style="text-align: justify;">You may be aware of the fact that a local Windows user with system rights and permissions can reset the password for other users, but did you know that <strong>a local user can also hijack other users&#8217; session</strong>, including domain admin/system user, <strong>without knowing their passwords</strong>?</p>
<p style="text-align: justify;"><strong>Alexander Korznikov</strong>, an <strong>Israeli security researcher</strong>, has recently demonstrated that a local privileged user can even hijack the session of any logged-in Windows user who has higher privileges without knowing that user&#8217;s password, using <strong>built-in command line tools</strong>.</p>
<p style="text-align: justify;">This trick works on almost <strong>all versions of Windows operating system</strong> and does not require any special privileges. Korznikov is himself unable to figure out if it is a <strong>Windows feature or a security flaw</strong>. The issue discovered by Korznikov is not entirely new, as a French security researcher, namely <strong>Benjamin Delpy</strong>, detailed a similar user session hijacking technique on his blog some six years ago.</p>
<p style="text-align: justify;">Korznikov calls the attack a <strong>&#8220;privilege escalation and session hijacking,&#8221;</strong> which could allow an attacker to hijack high-privileged users&#8217; session and gain unauthorized access to applications and other sensitive data. For successful exploitation, an attacker requires <strong>physical access</strong> to the targeted machine, but <strong>using Remote Desktop Protocol (RDP) session</strong> on a hacked machine; the attack can be performed remotely as well.</p>
<h3 style="text-align: justify;">Video Demonstrations and PoC Exploit Released!</h3>
<p><a href="https://www.youtube.com/watch?v=oPk5off3yUg&#038;feature=player_embedded">https://www.youtube.com/watch?v=oPk5off3yUg&amp;feature=player_embedded</a></p>
<p style="text-align: justify;">Korznikov has also provided a few video <strong>demonstrations of a successful session hijacking</strong> (using Task manager, service creation, as well as command line), along with Proof-of-Concept (<strong>PoC</strong>) exploit.</p>
<p style="text-align: justify;">Korznikov successfully tested the flaw on the newest <strong>Windows 10, Windows 7, Windows Server 2008 and Windows Server 2012 R2</strong>, though another researcher <a href="https://twitter.com/GossiTheDog/status/843053953537531904" target="_blank" rel="nofollow">confirmed on Twitter</a> that the flaw works on every Windows version, even if the workstation is locked.</p>
<p> While Microsoft does not deem it to be a security vulnerability and some experts argued that a <strong>Windows user with administrative permissions can do anything</strong>, Korznikov explained a simple attack scenario to explain how a malicious insider can easily misuse this flaw:</p>
<blockquote>
<p style="text-align: justify;">Some bank employee have access to the billing system and its credentials to log in. One day, he comes to work, logging into the billing system and start to work. At lunchtime, he locks his workstation and goes out for lunch. Meanwhile, the system administrator gets to can use this exploit to access employee&#8217;s workstation.</p>
<p style="text-align: justify;">According to the bank&#8217;s policy, administrator&#8217;s account should not have access to the billing system, but with a couple of built-in commands in windows, this system administrator will hijack employee&#8217;s desktop which he left locked. From now, a sysadmin can perform malicious actions in billing system as billing employee account.</p>
</blockquote>
<p><a href="https://www.youtube.com/watch?v=VytjV2kPwSg&#038;feature=player_embedded">https://www.youtube.com/watch?v=VytjV2kPwSg&amp;feature=player_embedded</a></p>
<p style="text-align: justify;">Well, no doubt, alternatively an attacker can also dump out system memory to retrieve users&#8217; passwords in plaintext, but this is a long and complicated process compared to <strong>just running tscon.exe</strong> with a session number <strong>without leaving any trace</strong> and using any external tool.</p>
<p> The issue has been <strong>known to Microsoft since last six years</strong>, so it&#8217;s likely the company doesn&#8217;t consider it a security flaw as it requires local admin rights on the computer, and deems this is how its <strong>operating system is supposed to behave</strong>.</p>
<p style="text-align: justify;">For more technical details, please check <a href="http://www.korznikov.com/2017/03/0-day-or-feature-privilege-escalation.html" target="_blank">Korznikov&#8217;s blog</a> directly.</p>
<p style="text-align: justify;"><span style="font-size: 8pt;"><strong>source:</strong> <a href="http://thehackernews.com" target="_blank">http://thehackernews.com</a>, <a href="http://www.korznikov.com/" target="_blank">http://www.korznikov.com/</a></span></p>
<p>The post <a href="https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/">Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hacker-reveals-easiest-way-hijack-privileged-windows-user-session-without-password/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/180 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-05 10:42:34 by W3 Total Cache
-->