Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 1 Vote(s) - 5 Average


Tutorial How to hack administrator account on a school or job network. filter_list
Author
Message
RE: How to hack administrator account on a school or job network. #21
(01-23-2013, 02:00 AM)Ultimatum Wrote: Doesn't work. How do you hack a computer that is already locked, son?

It worked for me. Although I had to use a boottable version of BT to plant the CMD.exe

[+] 1 user Likes Kinanizer's post
Reply

RE: How to hack administrator account on a school or job network. #22
OMFG this worked at school today! I showed the exploit to an IT manager at our school, and he gave me an Administrator account to manage security utilities.
Awesome

Reply

RE: How to hack administrator account on a school or job network. #23
(01-22-2013, 02:55 PM)JackDaniels Wrote: Step 3

Log out from your account and press "SHIFT" 5 times and the command prompt will appear "Cmd" insted of the stickey keys.

Since there are no account logged in your you will have the administrators right.

Now in the terminal you type in.

Nice tutorial :blackhat:
It would be nice to have a short list of circumstances where it wouldent work
  • User cannot put files into system32
  • Sticky keys is disabled by default
  • ect.
Also, does windows log the adding of new accounts via command prompt?
[Image: jWSyE88.png]

Reply

RE: How to hack administrator account on a school or job network. #24
Windows logs everything, so yes.

Reply

RE: How to hack administrator account on a school or job network. #25
In that case, is there any way to delete the logs with the newfound admin privilege?
[Image: jWSyE88.png]

Reply

RE: How to hack administrator account on a school or job network. #26
Kind of. They're all read-only for all but superuser. There might be tools to do it, I don't use Windows often enough to know.

Reply

RE: How to hack administrator account on a school or job network. #27
(01-23-2013, 04:19 AM)DrBlowFish Wrote: OMFG this worked at school today! I showed the exploit to an IT manager at our school, and he gave me an Administrator account to manage security utilities.
Awesome

That's great! I'm glad you found it useful!
[Image: qwertyr.png]

Reply

RE: How to hack administrator account on a school or job network. #28
This really isn't an exploit, it's just file rename.

If you're using XP and already in command prompt, replacing Stcky Keys with CMD is unnecessary because XP doesn't have UAC, you can do this just from your desktop. The only time you'd need to do this is if you're on a PC with UAC and you're trying to change the password to someone elses account.

In this specific situation, the sticky keys method is worthless.

Plus,

"Now go to the system32 folder, It's usually in. C:/windows/System32"

Lmfao, really? It's not "usually" there, that is the location for x86 operating systems.
For x64, it's C:\Windows\SysWOW64
Although x64 still uses \System32\, that still may be a point in where you would find the files.
Only saying this because you have know knowledge on this if you're saying 'it's usually System32'

Reply

RE: How to hack administrator account on a school or job network. #29
(01-27-2013, 06:19 PM)i0xIllusi0n Wrote: If you're using XP and already in command prompt, replacing Stcky Keys with CMD is unnecessary because XP doesn't have UAC, you can do this just from your desktop. The only time you'd need to do this is if you're on a PC with UAC and you're trying to change the password to someone elses account.

You're wrong. The whole point of users is that you can't change other's passwords. You have UAC confused with something else, otherwise you're just completely wrong.


(01-27-2013, 06:19 PM)i0xIllusi0n Wrote: Lmfao, really? It's not "usually" there, that is the location for x86 operating systems.
For x64, it's C:\Windows\SysWOW64
Although x64 still uses \System32\, that still may be a point in where you would find the files.
Only saying this because you have know knowledge on this if you're saying 'it's usually System32'

There is no 64 bit version of cmd.exe. It might be in SysWOW64, but it isn't 64 bit. For that reason, you'll always find it in System32, unless you configured your computer for maximum security.

Reply

RE: How to hack administrator account on a school or job network. #30
(01-27-2013, 09:20 PM)w00t Wrote:
(01-27-2013, 06:19 PM)i0xIllusi0n Wrote: If you're using XP and already in command prompt, replacing Stcky Keys with CMD is unnecessary because XP doesn't have UAC, you can do this just from your desktop. The only time you'd need to do this is if you're on a PC with UAC and you're trying to change the password to someone elses account.

You're wrong. The whole point of users is that you can't change other's passwords. You have UAC confused with something else, otherwise you're just completely wrong.


(01-27-2013, 06:19 PM)i0xIllusi0n Wrote: Lmfao, really? It's not "usually" there, that is the location for x86 operating systems.
For x64, it's C:\Windows\SysWOW64
Although x64 still uses \System32\, that still may be a point in where you would find the files.
Only saying this because you have know knowledge on this if you're saying 'it's usually System32'

There is no 64 bit version of cmd.exe. It might be in SysWOW64, but it isn't 64 bit. For that reason, you'll always find it in System32, unless you configured your computer for maximum security.

You can change other peoples' passwords in CMD just by running it. I know that from personal experience. XP doesn't have UAC, are you fucking retarded?
UAC = User Account Control. That's the box that comes up asking for admin privileges. XP does not have that.

Which is why I said,
"Although x64 still uses \System32\, that still may be a point in where you would find the files."
I have little knowledge about x64 configuration, but I do know that some files are still kept in System32.
[Image: BAvhP6h.png]
Code:
[5:42:25 PM] i0xillusi0n: Breshie don't bust a nut over chloe now
[5:42:31 PM] Entity: fapfapfapfapfapfapfapfapfapfap
[5:42:33 PM] Jigglypuff | SL: EWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW

Reply







Users browsing this thread: 3 Guest(s)