There isn't really a defense if you have system access to a machine with
a logged in administrative user. I have heard that enabling kerberos can
help in terms of session lifetime, but since you can just sniff the
user's clear-text keystrokes when they authenticate, its not a real
A fun trick us injecting into winlogon, start the keystroke monitor,
then locking the user's screen. When they authenticate to get back to
their desktop, you have the clear-text password.