Reef to Bikini Bottom [email protected] • 1 month agoTo this day, I don't know what it was meant forlemmy.caimagemessage-square106fedilinkarrow-up1760arrow-down114
arrow-up1746arrow-down1imageTo this day, I don't know what it was meant forlemmy.caReef to Bikini Bottom [email protected] • 1 month agomessage-square106fedilink
minus-square@[email protected]cakelinkfedilink6•edit-21 month agoIt’s a well known exploit on Windows: delete sethc.exe (sticky keys executable) from the system32 directory. replace it with a copy of cmd.exe (name it sethc.exe) reboot to login screen. shift 5 times, and you get a command prompt with administrator privileges Now, you can change all the passwords on the system from the login screen. Last I checked, it still works, and it’s been around since xp days.
minus-square@[email protected]linkfedilink1•1 month agoDon’t you need to be admin to muck with system32?
minus-square@[email protected]cakelinkfedilink2•1 month agoJust access to the hard drive. A bootable Linux USB could do that. I think you can get there through some obscure way with windows installation media as well.
care to explain a bit more?
It’s a well known exploit on Windows:
Now, you can change all the passwords on the system from the login screen.
Last I checked, it still works, and it’s been around since xp days.
Don’t you need to be admin to muck with system32?
Just access to the hard drive. A bootable Linux USB could do that. I think you can get there through some obscure way with windows installation media as well.