Unhackable Netbooks Given To Students

nb

Where would be the best place to test out an unhackable netbook? The NSW department of education in Australia thinks that college is perfect . They plan on distributing netbooks, preloaded with Windows 7,and iTunes. They also have bios level tracking and security, allowing them to be remotely shut down on command. With 20,000 of these in circulation, we would think that we’ll see someone proving the “unhackable” statement wrong. We can only hope.

[via slashdot]

285 thoughts on “Unhackable Netbooks Given To Students

  1. i have found out a wat to hack it but i dont know if it works. i was researchin the other dai and i found out a way.

    the thing is but u hav to take out the hard disk and thats why i havent done it yet.

    1. unscrew the cover
    2. tke out the harddisk
    3. plug it into a a hard disk reader that connects to ur pc.
    4. download a password tool onto ur pc
    5. click on ur skool harddisk and then choose reset admin password
    6. reset the admin to have no password
    7. der u goo

  2. @Pinku – the BIOS passwords for the new images? The old (now not working) one was “tknbnkx”, but it’s been changed as of mid-June (at least, at my school), when they were taken in for refurbishment.

    The Lenovo L512 was a mid-range ThinkPad released in January 2011, superseded in March by the L521. Wonder why it was referenced?

  3. @Anon I think L512 might be what the DMIG uses for testing, either that or it’s next years laptop. I have hacked DET’s servers and stolen a bunch of their files and user accounts/passwords. I found a server with CS5 Master Collection installer. On the laptops, just enable indexing service and you can find the WIM that is used to setup the laptops. About 17gb I think.. There are still 4 folders where you can run EXEs on current laptops – or at least that I’ve found.. Anyway, I ‘liberated’ all their BIOS password setup files, and the commisioning utility as well – pointless. I need to crack the bios passwords still – however I do have the current Administrator password which I cracked, but Group Policy keeps you from logging in.. I think..

  4. I don’t know why everyone wants to run EXEs, I just use it to run Chrome on my laptop. If anyone is willing to send either a teacher or TAFE account to me (raydbool@gmail.com), I will send you how to run EXEs. It is just like the old WIA, but a different folder. (There are still 4 folders unpatched where you can run EXEs)

  5. @Stevie
    Deleting it will just make your TSO angry. But I used to not be able to delete it, then the permissions mysteriously changed.
    Anyway send me an email to: raydbool@gmail.com
    Then I will tell you some proxies, maybe the administrator password as well, yes I have it. No it’s not the local administrator account – it’s one on the domain. Actually less trackable, just.
    OK, I’ll tell everyone the proxy actually.
    wmbc.org.au/ac1

  6. @Stevie
    Ever heard of DSL? It stands for Damn Small Linux. You can run it on the laptops through QEMU without being administrator. Ps. which laptop do you have?? s10e, mini10 or edge 11??

  7. No one is even posting here now.

    The Administrator password is ‘S1RollOutV1’, according to Microsoft, you can login with a disabled Administrator account in safe mode, but I haven’t got that to work. The account name is of course Administrator.

      1. wow this is old. things have changed so much since..
        and ‘more’ of a ‘hack’ to access this site on my laptop rather than phproxy/glype, is complete removal of blue coat. i can torrent at nice speeds onto the 100gb hard drive and it has no extra crap to disturb it. like a little node

  8. What a trip through memory lane. For the record, the way we ended up getting admin access was due to a nice trick by one of our class who moved to Normanhurst Boys from 2012 onwards. It involved using the Windows Repair tool which has a massive security hole. By interrupting the boot process (e.g. via removing the battery), the laptop enters System Repair, at the end of which a log is produced. The interface offers the user the option to view the log using Notepad, which has a file explorer view in the save and open dialogs. Since System Repair logs in using the SYSTEM account, all files on the HDD were modifiable here. Simply replacing the magnifier, sticky keys or high contrast tools via e.g. C:/Windows/System32/Magnify.exe or sethc.exe with a renamed copy of the command prompt, cmd.exe allows one to open a command prompt with full privileges at the next regular login screen using the accessibility tools. Accessibility indeed! This security hole is a testament to the ineptitude of the developers over at Microsoft, as it persisted over three major Windows versions (Vista, 7, 8). Many suspensions were meted out over this, but it was a small price to pay for maintaining one’s sanity through the NSW public school system.

Leave a Reply

Please be kind and respectful to help make the comments section excellent. (Comment Policy)

This site uses Akismet to reduce spam. Learn how your comment data is processed.