![]() ![]() ![]() This also gives the request initiator an elevated privilege, to access the device.Īs you may have gathered, with the above communication workflow for Windows Remote Assistance – there are multiple cyber risks, which could be associated with this capability.įor instance, a situation wherein a potential cyber criminal, forging their identity either as a Microsoft technician or an organization IT support, can influence a targeted user (victim) to access their Quick Assist tool and log in with a six-digit code, to fix an identified problem, providing them with complete access to their corporate system. This provides the recipient a code to let them allow connection to their devices. ![]() Quick Assist requests a code for identifying the users to match it with a session. In either cases, from a workflow standpoint, a request initiator (giving assistance) can invoke multiple sessions simultaneously – one with each targeted client, whereas the recipient (getting assistance) can only have one remote session at a point in time. With Quick Assist, a user can either “Get Assistance” or “Give Assistance”. exe file located at %windir%\system32\quickassist.exe.Īll the Quick Assist traffic is client-initiated and uses port 443, for contacting the address .com, and then receives the host IP that services the session with the user. It also allows a potential user to temporarily view or control another node, connected over a network or over the wire (internet). Quick Assist fundamentally is a remote access tool that allows a user to take control of another client remotely. It is provisioned by default on the Windows client and even though, the name of the tool varies as per the Windows language, searching for “Quick Assist” within the Start menu, should locate the tool irrespective of the windows language settings. One of the features that got introduced in Windand later, which most organizations are unfamiliar with, is Quick Assist. ![]() Microsoft Windows 10 is one of the most used operating systems in the world. J| By Shai Mark, Security Support Engineer ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |