Wednesday, September 19, 2018

Hacking the Window 10 device

I recently upgraded some driver in window 10 device after which the device was not letting me in and kept on throwing error that password method doesn't exist or incorrect password. I do not have any admin user setup available and was staring at possibility of calling HP help desk and likely option of re-imaging my device with loss of data.  Keeping that as last resort I tried various option and realized vulnerability of HP window 10 device or possibly any window 10 device. You can create an admin user out of nothing and restore anything and everything without even a trace of anyone finding someone meddled with the system. Steps as follow - 

  1. Restart your system with Shift key pressed from login window were you kept on getting the password error.
  2. You be routed to HP support page. Select troubleshoot option then recovery manager followed by run computer  checkup (maintenance) and finally get an option to select command prompt. [Other available option for command prompt will not work as it will end up taking you back to password page] This will have admin privilege allowing you to make below changes. Basically with the below command you will replace 'ease of use' button on login screen with command prompt where you will be able to create a new admin user. Admin user creation is allowed only from login screen and nowhere else.
  3. move d:\windows\system32\utilman.exe d:\windows\system32\utilman.exe.bak
  4. copy d:\windows\system32\cmd.exe d:\windows\system32\utilman.exe
  5. Once this is complete, use the command “wpeutil reboot” to restart the machine.
  6. You will see a command prompt where enter below command
  7. net user <username> /add
  8. net localgroup administrators <username> /add
  9. You need to be quick as system senses something fishy if you enter anything wrong and the prompt doesn't appear again. Leading you to re-do entire exercise once again.
  10. Now close the prompt, reboot, and you should see your new user in the login screen.
  11. No password required.
  12. Login go to system setting. PressWindow+R, and type netplwiz update password for account which you were unable to login.
  13. Reboot the system and done.
  14. Don't forget to revert back the name of utilman.exe file.
I found this to be a big vulnerability with Hp system and allows anyone to login to any one's Window10 device provided bios password is not set. 

All in all, I saved my self from pain of resetting my system again and in process learnt to hack into system.