

Hopefully, you can then reclaim more of your day, and, possibly, your sanity. However, a remote-access package allows you to find and fix the problem in the shortest time possible.

Remote technical support can be challenging. When the mouse pointer is outside the TeamViewer window, however, your key combinations will apply to your computer. For example, if you press Super+E to open a file browser window, this will be enacted on the remote computer, but not yours. The “Scaled” option is a good starting point, and it works best in most situations.Ĭlick “Actions” to open that menu. If you enable “Send Key Combinations,” your key combinations are then sent to the remote computer, and not your own. If you click “View” at the top of the window, a menu appears. You can select a view that best suits the combination of the two desktop resolutions, and the size of the window you want to use. There are a couple of settings worth noting. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decrypt the required password to login to the system.You can access menus, run applications, and use the keyboard the same as you would if you were sitting in front of that computer.

The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. With versions before v9.x, this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer.

It used a shared AES key for all installations since at least as far back as v8, and used it for at least OptionsPasswordAES in the current version of the product. Knowledge of the crash event and the TeamViewer ID as well as either possession of the pre-crash connection password or local authenticated access to the machine would have allowed to establish a remote connection by reusing the not properly deleted. TeamViewer Desktop through allows a bypass of remote-login access control because the same key is used for different customers' installations. TeamViewer Linux versions before 15.28 do not properly execute a deletion command for the connection password in case of a process crash.
