Jump to content

Recommended Posts

Posted

Hello everyone.

 

Time for my first tutorial on this site.

___________________________________________________________________________

 

Step 1

 

We are going to use the as I like to call it "The sticky keys exploit"

This is the only feature which can be used before logging in at logon screen.

So if we are able to replace the .dll file we are able to use it for something more fun eh?

 

Copy the CMD.exe file.

 

cmd.exe.png

 

Rename it "sethc.exe" without the "

 

Step 2

 

Now go to the system32 folder, It's usually in. C:/windows/System32

 

There paste the "cmd.exe" witch you renamed to "sethc.exe"

 

XP2.JPG

 

Click Yes.

 

Step 3

 

Log out from your account and press "SHIFT" 5 times and the command prompt will appear "Cmd" insted of the stickey keys.

 

Since there are no account logged in your will have the administrators right.

 

Now in the terminal you type in.

 

Net user

 

You will see something like this.

 

----------------------------------------------------------------------------------------------------------------
Administrator              ASPNET                                 Guest
"Some Account" <---- That's the one you want!

 

 

Not type in

 

net user "Some account" *

 

You will get this.

 

Type a password for the user: 

 

Type in the password you want.

 

Then you will get this.

 

Retype the password to confirm: 

 

Type it in again. Now log in to this account and enjoy your administrator privileges.

 

I hope you enjoy this tutorial!

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..