Windows: Difference between revisions
From DWIKI
No edit summary |
mNo edit summary |
||
(22 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
==Links== | |||
*[http://www.kellys-korner-xp.com/win_xp_passwords.htm Administrator and User Passwords in Windows XP] | *[http://www.kellys-korner-xp.com/win_xp_passwords.htm Administrator and User Passwords in Windows XP] | ||
*[[Cloning Windows/XP]] | |||
*[http://www.mvps.org/winhelp2002/ A Troubleshooting Guide to Windows XP] | |||
=HOWTO= | |||
=Gain admin access== | |||
Repair mode: | |||
Once the machine is rebooted, we can press Shift five times on the Windows login screen to invoke Sticky Keys. Since the executable has been overwritten, what we get instead is another Command Prompt - this time with NT AUTHORITY\SYSTEM permissions | |||
==Tools and commands== | |||
===mmc=== | |||
===wmi=== | |||
[http://www.microsoft.com/whdc/system/pnppwr/wmi/default.mspx Windows Management Instrumentation] | |||
===mmi=== | |||
===setacl=== | |||
===netsh=== | |||
===Third party tools=== | |||
*[http://www.filehippo.com/download_ccleaner/ ccleaner] | |||
==Viruses and spyware== | |||
*[http://www.livecdlist.com/purpose/windows-antivirus The liveCD list] | |||
*[http://www.surfright.nl/en/hitmanpro Hitman Pro] | |||
*http://www.malwarebytes.org/ | |||
*http://www.combofix.org/ | |||
*crapcleaner | |||
First let the scanners fetch their updates, disconnect system from network and then run malwarebytes before combofix | |||
===virus scanners=== | |||
*AVG | |||
*avira | |||
*avast | |||
avoid Norton :) | |||
==FAQs== | |||
===change NT password=== | |||
Boot a linux rescue CD containing chntpw and use that, or boot sysrescuecd and select 'ntpasss' | |||
===collect passwords=== | |||
http://www.maxfreeware.com/cain-and-abel-4920-microsoft-password-recovery.html | |||
===Recovery console=== | |||
Boot from CD, press R for recovery console | |||
recovery console commands | |||
*[http://support.microsoft.com/kb/314058 Description of the Windows XP Recovery Console] | |||
===Error logs=== | |||
===Problem access rights profile=== | |||
(exact message???) | |||
seems related to "prf*tmp" files on stored profile | |||
===Get hardware info=== | |||
[http://www.cpuid.com/softwares/cpu-z.html cpu-z] |
Latest revision as of 12:30, 22 November 2024
Links
HOWTO
Gain admin access=
Repair mode:
Once the machine is rebooted, we can press Shift five times on the Windows login screen to invoke Sticky Keys. Since the executable has been overwritten, what we get instead is another Command Prompt - this time with NT AUTHORITY\SYSTEM permissions
Tools and commands
mmc
wmi
Windows Management Instrumentation
mmi
setacl
netsh
Third party tools
Viruses and spyware
- http://www.malwarebytes.org/
- http://www.combofix.org/
- crapcleaner
First let the scanners fetch their updates, disconnect system from network and then run malwarebytes before combofix
virus scanners
- AVG
- avira
- avast
avoid Norton :)
FAQs
change NT password
Boot a linux rescue CD containing chntpw and use that, or boot sysrescuecd and select 'ntpasss'
collect passwords
http://www.maxfreeware.com/cain-and-abel-4920-microsoft-password-recovery.html
Recovery console
Boot from CD, press R for recovery console
recovery console commands
Error logs
Problem access rights profile
(exact message???)
seems related to "prf*tmp" files on stored profile