joker3327 wrote:
Bertster7 wrote:
OK. Foolproof solution.
You are using a laptop at the moment, right? I assume it at least has a CD writer and you have access to a CD.
1) Get
this (note the NT password recovery feature - that's what you want)
2) Burn it to CD.
3) If neccessary change the boot settings in the BIOS so the system boots from the CD before the HDD.
4) Use the Admin password reset feature
5) Reboot.
6) Log in as the Administator (which won't come up as an option on the welcome screen - unless in safe mode or if you "Hold Ctl + alt and pres delete twice." (not one I've ever tried, but sounds like it'll work)).
There you go. You are now logged on in an account that your dad is highly unlikely to ever check. Nor will it show up anywhere.
If you can't get into the BIOS to change the boot sequence (because of a password), you may need to reset your BIOS.
[VulnWatch] Blank Administrator password in DELL XP Professional install
* To: <bugtraq@xxxxxxxxxxxxxxxxx>
* Subject: [VulnWatch] Blank Administrator password in DELL XP Professional install
* From: "Michael Scheidell" <scheidell@xxxxxxxxxx>
* Date: Mon, 27 Jun 2005 13:08:07 -0400
* Cc: <security@xxxxxxxx>, <vulnwatch@xxxxxxxxxxxxx>, <cert@xxxxxxxx>, <security@xxxxxxxx>
* Delivered-to: mailing list vulnwatch@xxxxxxxxxxxxx
* Delivered-to: moderator for vulnwatch@xxxxxxxxxxxxx
* List-help: <mailto:vulnwatch-help@vulnwatch.org>
* List-post: <mailto:vulnwatch@vulnwatch.org>
* List-subscribe: <mailto:vulnwatch-subscribe@vulnwatch.org>
* List-unsubscribe: <mailto:vulnwatch-unsubscribe@vulnwatch.org>
* Mailing-list: contact vulnwatch-help@xxxxxxxxxxxxx; run by ezmlm
* Thread-index: AcV7Osm6xFvJtGqyT6KgZctjh9FUxg==
* Thread-topic: Blank Administrator password in DELL XP Professional install
Vulnerability in DELL Windows XP Professional - default hidden Administrator account allows local Administrator access
Systems: DELL(tm) Laptops with Windows(tm); Professional
Vulnerable: DELL Laptops with pre installed Microsoft Windows XP Professional SP2
Severity: High
Category: Unauthorized Administrator Access
Classification: Default Authentication
BugTraq-ID: tbd
CVE-Number: CAN-1999-0504
Remote Exploit: Maybe
Local Exploit: Yes
Vendor URL:
www.dell.comAuthor: Michael Scheidell, SECNAP Network Security
Internal Release date: May 31, 2005
Notifications: May 31, 2005, Emailed various security and cert addresses at DELL
Vendor Response: June 7, 2005: Dell Emailed and requested more information
SECNAP response: June 7, 2005: Sent Dell serial number and service tag code on test system
Additional Contact: Emailed Dell on June 14, 2005 to request status
Additional Contact: Emailed Dell on June 21, 2005 to request status, cc'd original cert and security addresses
FBI Infragard Release: June 24, 2005
Public Release Date: June 27, 2005
Problem:
DELL OEM XP Processional has a default hidden administrator account. Use of this account will allow anyone with physical access to the computer to fully control the computer, add spyware, keystroke loggers, password stealing software and read all files, including temp files, local files, documents, and any email that has been stored locally.
DELL does not inform the installer of this account, nor give them the option of putting a password on this account. If a savvy installer finds the function to change the password for the Administrator account, they are warned that they could lose data. Security best practices REQUIRE a password on all administrative (and root) accounts.
FYI Bert and Noob..... so your parents have set an admin password