0
black star's Avatar
Light Poster
Wow,thanks,now i can use this to hack people at my school
0
hackstudent's Avatar, Join Date: May 2011
Newbie Member
thanks boss. is it has need another user account for complete this work.
0
syseng_geek's Avatar, Join Date: May 2011
Newbie Member
In order for this to be effective, though, you already need to have administrative rights on the local box (by either a domain user or other local user).

You will not be able to do this with restricted access to the target system.

If you have physical access to the machine, you pretty much own it already.

Additionally, how does this fall under the category of "ethical hacking"? It seems like you are just trying to gain elevated rights on a system you should not be accessing in this way.

And it really isn't "hacking", it is simply using a different (and supported) method to manage user accounts and groups on the system.

Just my 2 cents...
0
hackstudent's Avatar, Join Date: May 2011
Newbie Member
thanks for share it with us.