Jump to content


Check out our Community Blogs

Register and join over 40,000 other developers!


Recent Status Updates

View All Updates

Photo

How to make a cmd.bat


  • Please log in to reply
24 replies to this topic

#13 MeTh0Dz

MeTh0Dz

    CC Leader

  • Just Joined
  • PipPipPipPipPipPipPip
  • 1726 posts

Posted 08 September 2008 - 12:03 PM

Regedit?

3rd Party Software.
  • 0

#14 Xav

Xav

    CC Mentor

  • VIP Member
  • PipPipPipPipPipPipPipPip
  • 8356 posts

Posted 08 September 2008 - 12:10 PM

1) Blocked

2) Oh, er... Blocked.
  • 0
If you enjoy reading this discussion and are thinking about commenting, why not click here to register and start participating in under a minute?

#15 MeTh0Dz

MeTh0Dz

    CC Leader

  • Just Joined
  • PipPipPipPipPipPipPip
  • 1726 posts

Posted 08 September 2008 - 04:32 PM

Don't try to be a smart *** when you don't know what you are talking about. Exploits and kernel mode code can go beneath the blocks.
  • 0

#16 morefood2001

morefood2001

    CC Leader

  • Expert Member
  • PipPipPipPipPipPipPip
  • 1011 posts

Posted 08 September 2008 - 07:53 PM

Xav,

It really depends on what software the place is using to protect the computers.

With fortress, Usually quickly booting linux off a flash drive and copying the configuration file (or entering c:/fortress/ into internet explorer's address bar) and taking it home will get you the admin password after a quick hex crack. Then you take it back the next day, hit the key combination and enter the password and voila, everything is unblocked :P
  • 0
If you enjoy reading this discussion and are thinking about commenting, why not click here to register and start participating in under a minute?

#17 Xav

Xav

    CC Mentor

  • VIP Member
  • PipPipPipPipPipPipPipPip
  • 8356 posts

Posted 09 September 2008 - 11:56 AM

No fortress. This is specialised school software. We don't even have the usual login screen, it's replaced by a secure school one!
  • 0
If you enjoy reading this discussion and are thinking about commenting, why not click here to register and start participating in under a minute?

#18 MeTh0Dz

MeTh0Dz

    CC Leader

  • Just Joined
  • PipPipPipPipPipPipPip
  • 1726 posts

Posted 09 September 2008 - 12:20 PM

Find a vulnerability, or try kernel code.
  • 0

#19 Orjan

Orjan

    CC Mentor

  • Moderator
  • 2918 posts
  • Location:Karlstad, Sweden
  • Programming Language:C, Java, C++, C#, PHP, JavaScript, Pascal
  • Learning:Java, C#

Posted 09 September 2008 - 01:07 PM

I believe a lot of these blocks are set by group policies, so users shouldn't be allowed to go around these limits in any ways. If someone manage to unset an policie, that policy service resets it back immediately.
  • 0

#20 morefood2001

morefood2001

    CC Leader

  • Expert Member
  • PipPipPipPipPipPipPip
  • 1011 posts

Posted 09 September 2008 - 04:58 PM

No fortress. This is specialised school software. We don't even have the usual login screen, it's replaced by a secure school one!


If you tell me the software being used (ask someone like a teacher), that will help me help you :) And I wouldn't be surprised if they are using novel and password protect bios :P A friend got a laptop used from a school once during a summer auction, and it was protected.

Just so you know, I had to do some physical motherboard resets to get in to reinstall windows, but I did it :) Thats why a bios protection is not really easily hackable.
  • 0
If you enjoy reading this discussion and are thinking about commenting, why not click here to register and start participating in under a minute?

#21 MeTh0Dz

MeTh0Dz

    CC Leader

  • Just Joined
  • PipPipPipPipPipPipPip
  • 1726 posts

Posted 09 September 2008 - 05:09 PM

I believe a lot of these blocks are set by group policies, so users shouldn't be allowed to go around these limits in any ways. If someone manage to unset an policie, that policy service resets it back immediately.


Dude, it's called local privilege escalation.
  • 0

#22 morefood2001

morefood2001

    CC Leader

  • Expert Member
  • PipPipPipPipPipPipPip
  • 1011 posts

Posted 09 September 2008 - 05:29 PM

Dude, it's called local privilege escalation.


Not so much escalation because that gives higher privileges.

I'd reference it more along the lines of tightening security through group policy, restricting access to potentially threatening applications.
  • 0
If you enjoy reading this discussion and are thinking about commenting, why not click here to register and start participating in under a minute?

#23 MeTh0Dz

MeTh0Dz

    CC Leader

  • Just Joined
  • PipPipPipPipPipPipPip
  • 1726 posts

Posted 09 September 2008 - 06:47 PM

Not so much escalation because that gives higher privileges.

I'd reference it more along the lines of tightening security through group policy, restricting access to potentially threatening applications.


No that's exactly what privilege escalation is, getting higher privileges.

Stop trying to rebuttal stuff I say unless you know that you are right. Every time you post in a and then you post, I have to go back and say whey I'm right and you're wrong.
  • 0

#24 nasser

nasser

    CC Lurker

  • Just Joined
  • Pip
  • 1 posts

Posted 18 August 2010 - 02:17 AM

thanks my friend. this batch file help me more than what you think! I use this for a part of a project.
nasser, from iran
  • 0




Recommended from our users: Dynamic Network Monitoring from WhatsUp Gold from IPSwitch. Free Download