Hacking Sethc and Office Trend USB Windows 7

Fajar Purnama
6 min readMar 11, 2020

1. Hack Administrative Access Windows 7

The PC was designed for the user to only have standard user account privilege (near guest account) where the user only have the right to read and execute certain data and application. Unlike administrator account doesn’t have the privilege to modify the PC’s setting for example uninstalling admin’s program, editing the registry, modify the services, set the startup, etc.

Here a method is explained for a standard user or non-user at all to gain administrative access. The method uses physical means through a bootable media such as CD or USB thumb drive to gain access to administrative command line (cmd.exe here) in order to create an administrator user using the vulnerability of sticky key (sethc.exe here). The simulation here uses Virtual Machine (VM) of Windows 7 since I don’t want to mess with my real Operating System (OS) (using VM is a great alternative for home experiment).

The concept is to use the vulnerability in Sethc.exe, more details can be referred to below video.

  1. Try hitting “Shift” button more than 5x, a sticky key should pop.
  2. Go to C:\Windows\System32.
  3. Replace “Sethc.exe” with “cmd.exe” by copying “cmd.exe” and renaming to “Sethc.exe”.
  4. Try hitting “Shift” button more than 5x again, a command prompt should pop.

--

--

Fajar Purnama

this blog contains all my articles licensed under creative commons attribution customized sharealike (cc-by-sa) where you can sell but mention the open one here