Jump to content

Recommended Posts

Posted

None of these ways are working for me :( can someone please give a detailed way of doing it, I tried every way that was listed but it always came up short.


Posted
None of these ways are working for me :( can someone please give a detailed way of doing it, I tried every way that was listed but it always came up short.

I just noticed that I forgot an important step in the registry hack I suggested...

It's been edited to add the important step of rebooting.

Posted

Remove It:

@REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 0 /f

Add it:

@REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f
Posted

Did you try loading their hive and all?

Try logging on as them, then going HKCU.

And can you tell us how they didn't work? Did you get an access denied error or nothing at all, and cmd still works?

And to all you proposing to prevent execution of cmd.exe or rename it or something, it would be trivial for someone to copy cmd.exe, paste it elsewhere, and and name it pwned.exe and then run it. The "official" method will work for any command window, as you get an error like this:

post-128497-1191472029_thumb.png

Pressing the any key will close the window.

  • 1 year later...
Guest freeze_love
Posted
Remove It:
@REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 0 /f

Add it:

@REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f

But I think, when cmd was disabled. You couldn't run those script. Right?

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...