Fun fact: A common way to get access to SYSTEM (higher than admin) privileges on Windows is the sethc exploit, where you replace sethc (the program that shows the sticky keys dialog) with command prompt, and it gets started as SYSTEM, the only thing needed is write access to System32, which can either be from an admin account or by editing the file system externally. This also allows opening a command prompt on the login screen, allowing some cursed things, like if you start explorer.exe on the login screen it combines the desktop and login screen.
Fun fact: A common way to get access to SYSTEM (higher than admin) privileges on Windows is the sethc exploit, where you replace sethc (the program that shows the sticky keys dialog) with command prompt, and it gets started as SYSTEM, the only thing needed is write access to System32, which can either be from an admin account or by editing the file system externally. This also allows opening a command prompt on the login screen, allowing some cursed things, like if you start explorer.exe on the login screen it combines the desktop and login screen.
I used to do this to make a hidden account on my computer to bypass my parents’ screen time restrictions
smort
I did this in college with windows 7. I don’t think it works on 10, but could be mistaken.
I helped an elderly man get back into his pc doing a variation of this.
Changed the accessibility magnifier function to comman prompt. Was able to log in and create another user account after he lost access to a password.
So not sure about that one specifically bit a variation worked on 10.
It worked in win10 a few years ago when I was working in IT…
Oh now that I think about it, it was the accessibility executable, not sticky keys.
deleted by creator
Ive done it on 10 before
That’s a common way to reset password for the accounts, among osk.exe file replacement