Reef@lemmy.ca to Bikini Bottom Twitter@lemmy.world · 6 months agoTo this day, I don't know what it was meant forlemmy.caimagemessage-square105fedilinkarrow-up1755arrow-down116
arrow-up1739arrow-down1imageTo this day, I don't know what it was meant forlemmy.caReef@lemmy.ca to Bikini Bottom Twitter@lemmy.world · 6 months agomessage-square105fedilink
minus-squareThe Stoned Hacker@lemmy.worldlinkfedilinkarrow-up3·6 months agocare to explain a bit more?
minus-squarejas0n@lemmy.worldlinkfedilinkarrow-up6·edit-26 months agoIt’s a well known exploit on Windows: delete sethc.exe (sticky keys executable) from the system32 directory. replace it with a copy of cmd.exe (name it sethc.exe) reboot to login screen. shift 5 times, and you get a command prompt with administrator privileges Now, you can change all the passwords on the system from the login screen. Last I checked, it still works, and it’s been around since xp days.
minus-squarejj4211@lemmy.worldlinkfedilinkarrow-up1·6 months agoDon’t you need to be admin to muck with system32?
care to explain a bit more?
It’s a well known exploit on Windows:
Now, you can change all the passwords on the system from the login screen.
Last I checked, it still works, and it’s been around since xp days.
Don’t you need to be admin to muck with system32?