Hi, everybody! Today, I'll be showing you a wonderful thing. And that is: How to view somebody's files, programs, and so much more from their own computer if only they meet two conditions.
So if both of these conditions are satisfied, let us continue.
Before we get into the actual methodology, we must cover some things. mainly: ethics, or what this post is actually written for. After you read the below info and learn how to access someone's files, programs, and everything else on their computer without knowing their password, you have to understand that you can't just do this malitiously. What I mean by that is that if you're wanting to look at a person's data without their permission, it shouldn't be to in any way abuse the person in question, nor should it be used to delete any files they may hold near and dear to their heart. In short: just have fun with this and use the knowledge provided here to prank a friend by convincing them that you're some kind of computer genius or something and can get into their deepest, darkest secrets any time you like. Don't go reading something private and then posting it all over the internet in order to shame a fellow. Now that's out of the way, here's what you do.
This process is not, overall, very blind-friendly. If you are blind and attempting this, note that Narorator is not available in the boot manager. You can usually just get into there and press the down arrow a couple times and select the right drive with trial and error, but if you can't get it, try this.
If you have an iPhone, download Seeing AI if you select "Short Text" mode from within the app, then line your phone's camera up with the computer screen, it should read you the order of the drives so that you know how many times you need to press the down arrow key to select yours.
If you are not blind, note that the customized version of Windows loaded onto your flash drive has been adapted to work for those who are, and thus, a "ScreenReader" will speak upon boot. To disable it, press Capslock+n, then click exit. In the options that appear, select "Exit" and use Windows normally.
Basically what's happening is: the file you downloaded is a Pre-Installation Image of Windows, which means it's designed to be used before Windows is actually installed. Of course, we're not using it as intended here, but, you know, whatever. So that file was contained inside a program called "Rufus" which is an application that burns ISO's to external media, and that's exactly what this did.
Once you did that, you put the USB into the victim computer, and then accessed Boot Manager. By default, the machine will boot from its internal hard drive, but we don't want it to do that, because that drive contains an unmodified version of the Windows Operating System that's going to ask us for a password to view anything. Instead, we want the computer to run the operating system that has no password on it, which is on our flash drive. So we tell the computer: "Hey, run the OS on this drive instead of the internal," so it does. Then the computer boots from the external drive, the non-protected version of Windows loads, and you view people's "Private" data. Bingo, bango, bongo.
This really isn't so much as a hack as it is an exploitation of a recovery feature that Windows has. If your hard drive ever becomes corrupted, you'll need a fresh copy of Windows to repair it, which you'll need to mount to a flash drive, plug in to your pc, go to boot manager, and tell your computer to read from the USB. Seem familiar? Yep, only what happens if the operating system on your flash drive is designed to be run independently? Well, are you ever in trouble. Now anybody can read anything on your machine. HAHAHAHAHA!
In this guide we cover the steps of accessing a person's personal data, or the data stored on any computer running windows 7 or later, via the concept of Windows recovery and Pre-Installation images. This process requires using boot manager, a utility which you can use to tell your computer where you want it to run an operating system from. Once again, this process should not be used for malitious intent.Questions? Contact me!
I hope you all enjoyed this guide, and please stay tuned for more helpful tips and walkthroughs on more technology. Coming soon!