You're viewing a single thread.
View all comments
106
comments
You guys are missing the true point of sticky keys:
Admin console without admin password.
5 0 Replycare to explain a bit more?
3 0 ReplyIt's a well known exploit on Windows:
- delete sethc.exe (sticky keys executable) from the system32 directory.
- replace it with a copy of cmd.exe (name it sethc.exe)
- reboot to login screen.
- shift 5 times, and you get a command prompt with administrator privileges
Now, you can change all the passwords on the system from the login screen.
Last I checked, it still works, and it's been around since xp days.
6 0 ReplyDon't you need to be admin to muck with system32?
1 0 ReplyJust access to the hard drive. A bootable Linux USB could do that. I think you can get there through some obscure way with windows installation media as well.
2 0 Reply
You've viewed 106 comments.
Scroll to top