Trending Tutorials

Hacker Tip – Acquiring Administrative Access to Windows!

In this video, I will show you one of Windows weaknesses to break into your system. I’ll show you how to get access to the local computer and break into the company’s domain by giving yourself elevating admin rights.

Notes from video –

Support the video by giving it a “LIKE”, it will help me out.

Follow Me at Twitter:
Tech Site:

27 Comments on Hacker Tip – Acquiring Administrative Access to Windows!

  1. I could not find my username to add in administrators group

  2. I want to do this in my school laptop ,so does any one from my school will know about it ?

  3. with a CD or DVD in the drive? Or no CD or DVD in the computer? It seems like you skipped a step

  4. I dont have that exe 🙂 I use linux live and than just run chntpw I can change user account permissions and reset passwords.

  5. waaaaaaait is there a part of this vid that "we're on our own"??? typing what we want to type or input????? please explain it to me clearer tnxxxxx


  7. I dont think that this gives you full access to a domain however this is essentially the same thing as the windows 7 bypass except the file is replaced by cmd in a different way

  8. It doesn’t work anymore…

  9. Great video. But i have 3 questions

    1: does it have to be a CD and not a USB stick?

    2: does it have to be a specific release or version of windows?

    3: Can you send a link to the windows download?

  10. Ima try this at school…if I get caught…welp…I won't though I do this all the time and was almost caught with something like this but I thing I'll be good only 32 steps and a piece of paper I think I'll be fine…
    (It was at this moment I knew I'm going to be screwed)

  11. you have earned my sub but simply in my case I rather use a rubber ducky yes illegal but easy some admins deactivate usbs but not all this method never crossed my mind thanks man

  12. Not saying that this would prevent the damage, but utilizing restricted groups (GPO) would remove the account added to the security group in question. However, you are at the mercy of the GPO refresh cycle.

  13. also it keeps saying acess denied

  14. hey man just wondering my stud is in c drive and it wont let me do what ur doing with the d drive its saying system cannot find the path specified so can u plz help me ,man

  15. Old one but still works.

  16. Wow. Very informative.

  17. Scary stuff, will have ago at this

  18. Awesome stuff – but I want to clarify that this isn't going to compromise the Domain. What is done here, is adding a Domain user to the local Administrator group. The Domain user is now part of the Local Administrators, so if this user went to another machine, they wouldn't have the escalated privileges. Had to test this myself to be sure, and I wasn't able to add the user to the Domain Admins group. The CMD only has SYSTEM permissions, which are over the local machine.

  19. In a enterprise Enviroment you ve got some easy ways to prevent this.

    -BIOS Settings like Kevin Tyler sayin
    -AD Right Management
    -AV System like McAffee
    -GPO Settings that Prevent Access to such tools linke utilman

    But thanks for the Video it is a good reminder to check the AD Security.

  20. Cant wait to mess with my roommate's PC! Lol

    Just kidding! I wouldn't do that to him. Or would I? Lol

  21. Old trick but still works!

  22. This only gives you local admin on the specific computer. You can't do anything on the domain with it.

  23. Good video. But in the real world this would not work.

  24. If a company or organization has a good network admin, They'll password protect the bios settings and disable booting off of removable media. Just sayin.

  25. It doesn't matter if you can add your domain user as a local admin to the machine as you're not going to compromise your domain with that. Every O.S. (linux, OSX, Windows) is capable of being manipulated this way. This is because when you have access to the hardware, you have control of the machine.

    This is why the physical security to your server room is just as important as the complexity of your passwords. This is also why you lock down the BIOS to all of your machines and disable booting from other devices.

    Security 101

Leave a comment

Your email address will not be published.