this post was submitted on 28 May 2024
749 points (98.2% liked)

Bikini Bottom Twitter

3540 readers
181 users here now

Are ya ready kids?!

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 5 months ago (1 children)
[–] [email protected] 6 points 5 months ago* (last edited 5 months ago) (1 children)

It's a well known exploit on Windows:

  • delete sethc.exe (sticky keys executable) from the system32 directory.
  • replace it with a copy of cmd.exe (name it sethc.exe)
  • reboot to login screen.
  • shift 5 times, and you get a command prompt with administrator privileges

Now, you can change all the passwords on the system from the login screen.

Last I checked, it still works, and it's been around since xp days.

[–] [email protected] 1 points 5 months ago (1 children)

Don't you need to be admin to muck with system32?

[–] [email protected] 2 points 5 months ago

Just access to the hard drive. A bootable Linux USB could do that. I think you can get there through some obscure way with windows installation media as well.