If you use ntrights, you must be the only user logged on, and you must logoff and logon again before the privilege takes effect. Syntax: ntrights -u Users +r SeDebugPrivilege Use ntrights.exe from the Windows Server 2003 Resource Kit, a free download,, to grant yourself the SeDebugPrivilege. Ģ) Once Task Manager launches, End Task explorer.exeģ) On the Task Manager menu, choose File / New Task (Run.), Type explorer.exe to launch the explorer shell under the System account which has Debug PrivilegesĤ) Run Deep Unfreezer from the System account. To perform the test you must first grant yourself the "Debug Programs" privilege (revoked by Deep Freeze) by escalating to the Local System account using Task Scheduler from the command line (Start/run, cmd):ġ) Type: at 11:23pm /interactive taskmgr.exe (add one or two minutes from the current time).
At the end of the article are a couple of tips on how to secure your machines running vulnerable Deep Freeze installations.) Author is not responsible for abuse of this information. It is intended to be used for testing purposes only, and is not to be construed as a "hacking tutorial on how to hack Deep Freeze". (Disclaimer: this tutorial and information is provided as is, and is intended for network administrators currently using Deep Freeze on their networks, to provide them with up-to-date vulnerability information on the inherent security flaws in the Deep Freeze program. It works on almost ALL versions of Deep Freeze, including the latest version, v5.60.120.1347, released Oct-20-2005 to supposedly thwart his program-it does not! You can use Deep Unfreezer to test for the vulnerability on your own machines: A black-hat computer programmer in Argentina with a grudge against Faronics, Emiliano Scavuzzo, has written a program to thaw Deep Freeze without knowing the password.