Could also just have a USB/CD of Hiren's Boot CD and use one of its many utils to get in. Frankly, as long as you have physical access to the machine, there are countless ways to get past the Windows login screen.
I don’t think this’ll actually work on Windows 11 merely because of the BitLocker TPM requirement. I did notice, however, that if there is a factory image recovery option from the OEM vendor that it may nullify the administrator account requirement but certain utilities such as System Restore won’t work (though you can just rename the files in command prompt anyway, which works without fail)
Honestly if you are infected where someone has console remote access to your system, or who is sitting at your desk, or has physically stolen your machine, then this exploit is really not the worst of your issues.. hahaha.. besides you could always change it back once you got back into your system.
I try to tell my younger IT co-workers to just chill.. In reality someone who is going to go out of their way to hack your system has to have a reason to attempt it.. These big hacking groups aren't going to waste there time attempting to hack into someones desktop to compromise a desktop belonging to the low level techs and engineers like myself, there's nothing to gain from doing it.. What are they going to take the 50 dollars us in IT industry have to our names? What a waste of time that would be.. hahaha..
Could also just have a USB/CD of Hiren's Boot CD and use one of its many utils to get in. Frankly, as long as you have physical access to the machine, there are countless ways to get past the Windows login screen.
thats why we got stuff like secure boot for and bitlocker. if someone wanted to be more secure
Ain’t those only for Windows XP though? Considering it hasn’t been updated for 10+ years
I don’t think this’ll actually work on Windows 11 merely because of the BitLocker TPM requirement. I did notice, however, that if there is a factory image recovery option from the OEM vendor that it may nullify the administrator account requirement but certain utilities such as System Restore won’t work (though you can just rename the files in command prompt anyway, which works without fail)
Ease of access to the malicious actors 👍
Honestly if you are infected where someone has console remote access to your system, or who is sitting at your desk, or has physically stolen your machine, then this exploit is really not the worst of your issues.. hahaha.. besides you could always change it back once you got back into your system.
@@GenericTechSupport indeed, so are the many chip level vulnerabilities that cause panic in the general public
I try to tell my younger IT co-workers to just chill.. In reality someone who is going to go out of their way to hack your system has to have a reason to attempt it.. These big hacking groups aren't going to waste there time attempting to hack into someones desktop to compromise a desktop belonging to the low level techs and engineers like myself, there's nothing to gain from doing it.. What are they going to take the 50 dollars us in IT industry have to our names? What a waste of time that would be.. hahaha..
ilamepari-garuda, nobody want to hack you, u got nothing
Cool trick. ty