
Create a report of users with local administrator rights The attacker could then move laterally from system to system dropping malicious files, stealing data, and so on.īoth scenarios can be mitigated by getting control of your local admin groups. Now… Let’s move on to the tutorial. If an attacker cracked this password the attacker then has administrator access to all the machines that this account is created on. Scenario 2: Someone.maybe a helpdesk tech created a local user on multiple computers with the same password and added it to the local administrator group. Because the user is logged in with administrator rights this malicious code has full rights to the computer, it could install a keylogger, sniffer, run ransomware and encrypt all the files, install remote control software, and so on. This attachment contains executable code and is executed on the computer. Scenario 1: A user is logged in to their computer with administrator rights, this person is fooled into opening an email that contains a malicious attachment. Exploiting administrator rights is a primary method attackers use to spread and gain control of systems inside and organization. You do not want your users to log into computers and perform daily work with administrator rights. Why Local Administrator Rights is a Huge Security Risk




