Showing posts with label Window hack. Show all posts
Showing posts with label Window hack. Show all posts

Gain Admin Privileges From Guest Account(for Windows-Xp)



Most of you may have alreadyseen a student of your college or school performing this hack on lab computer. Students generally don't have Administration privileges on lab computers to copy or install applications where they use this hack to gain some real stuff done on PC.

Vulnerability:
Windows command line task scheduler supports interactive mode which works somewhat same as sudo -i or su -i command in Linux/UNIX the only problem is that it does not ask you for password. This vulnerability is patched up in further versions of Windows than XP and works fine even in XP-3.

Procedure:
Open command prompt and type

c:\>time

and note the time, time will be presented in 24 hour clock format. Note this time.
Now open “Task Manager” by typing
“c:\>taskmgr”
now from processes and end explorer.exe .

Now type,

c:\>at [(time displayed in 24 hour clock format)+2 minutes] /interactive cmd.exe
for example
---
c:\>time
The current time is: 0:27:11.68
Enter the new time:
c:\>taskmgr
c:\>at 0:29:00:00 /interactive cmd.exe
--
Now type c:\>exit
and wait for two minutes. After two minutes command prompt will open in interactive mode with all administrative privileges without asking you for password. Now run any command from it it'll run with full administrative privileges so that you can even install programs and applications in system. So type “explorer.exe” in cmd and use system with administrative privilege even when you are in guest account.

Countermeasure: Disable command prompt for guest account.

By the way no college can ever disable command prompt because practicals are done over it, so guys get your stance and enjoy freedom

READMORE
 

Cracking windows NT/2000 passwords using SAM file

windows NT uses the SAM to store and retrieve user credentials such as passwords. SAM: The security accounts manager. Because the SAM stores its information in the SAM database, you can assume that NT is only as secure as its SAM data.  The SAM file is located at %systemroot%\system32\config directory. Although the \config directory contains a working version of the SAM database so programs such as Windows Explorer can't directly access the database for copying while the system is running.

For gaining the access to this SAM file, boot the system from an alternative OS or any live OS. Now you can copy this SAM file to any other location.

There is also a backup of SAM file in the location %systemroot%\repair

Password is stored in encrypted form in the SAM called hashes. Use any password cracking software like LOphtcrack to know the password of the system from these hashes.

to know more about SAM file visit Microsoft official website.
READMORE