Windows: Difference between revisions

From DWIKI
mNo edit summary
 
(7 intermediate revisions by the same user not shown)
Line 3: Line 3:


*[[Cloning Windows/XP]]
*[[Cloning Windows/XP]]
*[http://www.mvps.org/winhelp2002/ A Troubleshooting Guide to Windows XP]
=HOWTO=
=Gain admin access==
Repair mode:
Once the machine is rebooted, we can press Shift five times on the Windows login screen to invoke Sticky Keys. Since the executable has been overwritten, what we get instead is another Command Prompt - this time with NT AUTHORITY\SYSTEM permissions


==Tools and commands==
==Tools and commands==
Line 18: Line 25:


==Viruses and spyware==
==Viruses and spyware==
*[http://www.livecdlist.com/purpose/windows-antivirus The liveCD list]
*[http://www.surfright.nl/en/hitmanpro Hitman Pro]
*[http://www.surfright.nl/en/hitmanpro Hitman Pro]


*http://www.malwarebytes.org/
*http://www.malwarebytes.org/
*http://www.combofix.org/
*http://www.combofix.org/
*crapcleaner


Run malwarebytes first, then combofix
First let the scanners fetch their updates, disconnect system from network and then run malwarebytes before combofix


===virus scanners===
===virus scanners===
*AVG
*AVG
*avira
*avira
 
*avast


avoid Norton :)
avoid Norton :)
Line 36: Line 46:
Boot a linux rescue CD containing chntpw and use that, or boot sysrescuecd and select 'ntpasss'
Boot a linux rescue CD containing chntpw and use that, or boot sysrescuecd and select 'ntpasss'


===collect passwords===
http://www.maxfreeware.com/cain-and-abel-4920-microsoft-password-recovery.html


===Recovery console===
===Recovery console===
Line 51: Line 64:


seems related to "prf*tmp" files on stored profile
seems related to "prf*tmp" files on stored profile
===Get hardware info===
[http://www.cpuid.com/softwares/cpu-z.html cpu-z]

Latest revision as of 12:30, 22 November 2024

Links

HOWTO

Gain admin access=

Repair mode:

Once the machine is rebooted, we can press Shift five times on the Windows login screen to invoke Sticky Keys. Since the executable has been overwritten, what we get instead is another Command Prompt - this time with NT AUTHORITY\SYSTEM permissions


Tools and commands

mmc

wmi

Windows Management Instrumentation

mmi

setacl

netsh

Third party tools

Viruses and spyware

First let the scanners fetch their updates, disconnect system from network and then run malwarebytes before combofix

virus scanners

  • AVG
  • avira
  • avast

avoid Norton :)

FAQs

change NT password

Boot a linux rescue CD containing chntpw and use that, or boot sysrescuecd and select 'ntpasss'


collect passwords

http://www.maxfreeware.com/cain-and-abel-4920-microsoft-password-recovery.html

Recovery console

Boot from CD, press R for recovery console

recovery console commands

Error logs

Problem access rights profile

(exact message???)

seems related to "prf*tmp" files on stored profile


Get hardware info

cpu-z