![Remko Weijnen on Twitter: "Seems goold old qwinsta.exe has some undocumented commandline switches #rds #terminalserver #qwinsta https://t.co/l7e7fHRcyA" / Twitter Remko Weijnen on Twitter: "Seems goold old qwinsta.exe has some undocumented commandline switches #rds #terminalserver #qwinsta https://t.co/l7e7fHRcyA" / Twitter](https://pbs.twimg.com/media/Ei7MtNNWoAAfNVq.png)
Remko Weijnen on Twitter: "Seems goold old qwinsta.exe has some undocumented commandline switches #rds #terminalserver #qwinsta https://t.co/l7e7fHRcyA" / Twitter
![kmkz on Twitter: "Post-exploitation #Friday tip: Do you know how to trivially & remotely hijack an #RDP session without prompt nor warning on user's side using #Microsoft signed binary (no patch/multi-session) ? kmkz on Twitter: "Post-exploitation #Friday tip: Do you know how to trivially & remotely hijack an #RDP session without prompt nor warning on user's side using #Microsoft signed binary (no patch/multi-session) ?](https://pbs.twimg.com/media/EPDG591WAAAJzAR.jpg)
kmkz on Twitter: "Post-exploitation #Friday tip: Do you know how to trivially & remotely hijack an #RDP session without prompt nor warning on user's side using #Microsoft signed binary (no patch/multi-session) ?
![windows 10 - What is this hashed Session Name when I run qwinsta on my Win10 workstation? - Super User windows 10 - What is this hashed Session Name when I run qwinsta on my Win10 workstation? - Super User](https://i.stack.imgur.com/fJIVo.png)
windows 10 - What is this hashed Session Name when I run qwinsta on my Win10 workstation? - Super User
![Windows 2012 Server. Gestire gli utenti loggati tramite Remote Desktop con la powershell. | The wickerman75 Windows 2012 Server. Gestire gli utenti loggati tramite Remote Desktop con la powershell. | The wickerman75](https://thewickerman75.files.wordpress.com/2016/11/yd78z.png)