⭕Physical Attack
Sticky Keys + Binary Replacement
If we can boot from a live USB and access the windows file system indirectly, it is possible to replace some of the binaries responsible for "sticky key" actions such as:
SETHC: sethc.exe is invoked when SHIFT is pressed 5 times
UTILMAN: Utilman.exe is invoked by pressing WINDOWS+U
OSK: osk.exe is invoked by pressing WINDOWS+U, then launching the on-screen keyboard
DISP: DisplaySwitch.exe is invoked by pressing WINDOWS+P
These binaries are located inside C:\Windows\System32
.
we can change any of them for a copy of the binary cmd.exe (also in the same folder) and any time that you invoke any of those binaries a command prompt as SYSTEM will appear at the login screen.
Modifying SAM
We can use the tool chntpw to modify the SAM file of a mounted Windows filesystem. Then, you could change the password of the Administrator user, for example. this tool is available in Kali Linux.
boot from a live disk and mount the windows installation partition (usually the C drive):
change directory to:
list available users:
Select User:
Select an Option from the Menu.
Unmount Windows Partition & Reboot.
This technique wont work on a windows 10 system if the PIN protection is also activated.
Kon-Boot
Kon-Boot is one of the best tools around which can log you into Windows without knowing the password. It works by hooking into the system BIOS and temporarily changing the contents of the Windows kernel while booting (new versions work also with UEFI). It then allows you to enter anything as the password during login. The next time you start the computer without Kon-Boot, the original password will be back, the temporary changes will be discarded and the system will behave as if nothing has happened.
It is a live CD/USB that can patch the memory so you won't need to know the password to login. Kon-Boot also performs the StickyKeys trick so you could press Shift 5 times to get an Administrator cmd.
Last updated