Where would be the best place to test out an unhackable netbook? The NSW department of education in Australia thinks that college is perfect . They plan on distributing netbooks, preloaded with Windows 7,and iTunes. They also have bios level tracking and security, allowing them to be remotely shut down on command. With 20,000 of these in circulation, we would think that we’ll see someone proving the “unhackable” statement wrong. We can only hope.
[via slashdot]
Could you plaese tell us how you got admin then
or you could email me at “muso96@gmail.com” so it doesn’t become blocked
I just went to projectd3t.com and there is a hacking thread, which teaches you how to do it.
Meh these laptops have been hacked
i have found out a wat to hack it but i dont know if it works. i was researchin the other dai and i found out a way.
the thing is but u hav to take out the hard disk and thats why i havent done it yet.
1. unscrew the cover
2. tke out the harddisk
3. plug it into a a hard disk reader that connects to ur pc.
4. download a password tool onto ur pc
5. click on ur skool harddisk and then choose reset admin password
6. reset the admin to have no password
7. der u goo
Hahahaha. I got all three bios passwords, and Administrator. Ps anyone know what Lenovo L512 is?? Found a reference to it while hacking..
If anyone seriously wants the info, email me:
raydbool@gmail.com
@Pinku – the BIOS passwords for the new images? The old (now not working) one was “tknbnkx”, but it’s been changed as of mid-June (at least, at my school), when they were taken in for refurbishment.
The Lenovo L512 was a mid-range ThinkPad released in January 2011, superseded in March by the L521. Wonder why it was referenced?
Yea same, the password was changed for my laptop too and my fellow classmates.
@Anon I think L512 might be what the DMIG uses for testing, either that or it’s next years laptop. I have hacked DET’s servers and stolen a bunch of their files and user accounts/passwords. I found a server with CS5 Master Collection installer. On the laptops, just enable indexing service and you can find the WIM that is used to setup the laptops. About 17gb I think.. There are still 4 folders where you can run EXEs on current laptops – or at least that I’ve found.. Anyway, I ‘liberated’ all their BIOS password setup files, and the commisioning utility as well – pointless. I need to crack the bios passwords still – however I do have the current Administrator password which I cracked, but Group Policy keeps you from logging in.. I think..
Also I am using a proxy right now.. It is unblocked for now.. However I have set up my own and I doubt DET will ever manage to block it.. hehe.
I hate this proxy.. stuffs up the timezone by heaps!!
Could you please tell me 1 of the folders where you can run exe’s? I’ve been looking for ages but I can’t find an exe folder that is unblocked.
Only if you are willing to give me a teacher or tafe account!
I don’t know why everyone wants to run EXEs, I just use it to run Chrome on my laptop. If anyone is willing to send either a teacher or TAFE account to me (raydbool@gmail.com), I will send you how to run EXEs. It is just like the old WIA, but a different folder. (There are still 4 folders unpatched where you can run EXEs)
I hope everyone knows you can delete the c:\detapps folder.
What happened to all the hackers hanging around here??
Don’t worry, I found one the folders. And what does deleting c:/detapps do anyway?
Well, I have had no response. If anyone wants to run EXEs, just email me. I am only going to tell 1 person though.
@Stevie
Deleting it will just make your TSO angry. But I used to not be able to delete it, then the permissions mysteriously changed.
Anyway send me an email to: raydbool@gmail.com
Then I will tell you some proxies, maybe the administrator password as well, yes I have it. No it’s not the local administrator account – it’s one on the domain. Actually less trackable, just.
OK, I’ll tell everyone the proxy actually.
wmbc.org.au/ac1
I am getting pretty bored here. Anyway, with the admin account I got, I can do anything.. but I didn’t hack anything because they just had the password lying around on their server.
Cheers for the proxy. Did you get admin by that windows repair thing?
No, I never heard of Windows Repair. I found the password in an unprotected MyLocker folder.
@Stevie
Ever heard of DSL? It stands for Damn Small Linux. You can run it on the laptops through QEMU without being administrator. Ps. which laptop do you have?? s10e, mini10 or edge 11??
Lenovo Thinkpad mini10
If anyone wants the BIOS passwords to try and crack them I MIGHT send you them. As always, raydbool@gmail.com
I have the s10e.
@Stevie
OK, thanks. Sorry, but I am going to leave this forum forever.. got better stuff to do!!
No one is even posting here now.
The Administrator password is ‘S1RollOutV1’, according to Microsoft, you can login with a disabled Administrator account in safe mode, but I haven’t got that to work. The account name is of course Administrator.
just thought y’all’d like to know…im on my det laptop atm, and this is a blocked site ~.^ unhackable my arse ^.^
Using someone else’s account is not hacking.
Neither is using PHProxy or Glype.
wow this is old. things have changed so much since..
and ‘more’ of a ‘hack’ to access this site on my laptop rather than phproxy/glype, is complete removal of blue coat. i can torrent at nice speeds onto the 100gb hard drive and it has no extra crap to disturb it. like a little node
Hey Xeriok, send me an email:
raydbool@gmail.com
I’m interested to know how you removed BlueCoat –
I know of a few ways myself.
So glad my laptop is unlocked, all the filtering is gone
Not sure what you mean,
Blue Coat only filters the internet at home,
(which is probably what you removed)
BlueCoat filters all the time – they are the caching proxy servers on the DET internet link.
What a trip through memory lane. For the record, the way we ended up getting admin access was due to a nice trick by one of our class who moved to Normanhurst Boys from 2012 onwards. It involved using the Windows Repair tool which has a massive security hole. By interrupting the boot process (e.g. via removing the battery), the laptop enters System Repair, at the end of which a log is produced. The interface offers the user the option to view the log using Notepad, which has a file explorer view in the save and open dialogs. Since System Repair logs in using the SYSTEM account, all files on the HDD were modifiable here. Simply replacing the magnifier, sticky keys or high contrast tools via e.g. C:/Windows/System32/Magnify.exe or sethc.exe with a renamed copy of the command prompt, cmd.exe allows one to open a command prompt with full privileges at the next regular login screen using the accessibility tools. Accessibility indeed! This security hole is a testament to the ineptitude of the developers over at Microsoft, as it persisted over three major Windows versions (Vista, 7, 8). Many suspensions were meted out over this, but it was a small price to pay for maintaining one’s sanity through the NSW public school system.