Elevate myself in a CMD Windows 7 command prompt? ("su" or "sud


Recommended Posts

Hey

How do I make a normal CMD command prompt into a administrator CMD command prompt? I understand perfectly that it will ask for my permission (and/or username and password) but thats OK. I just want the su or sudo -i equivilent. Thanks!

Link to comment
Share on other sites

You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option.

Link to comment
Share on other sites

yes u can go to start all programs accessories find the cmd right click run as admin now..

just remember in windows right click does alot .. and if ur on 8 maybe they changed it but in 7 vista xp right click

Link to comment
Share on other sites

you want the RUNAS command, to run a command as another user. It works vaguely like sudo, run it without any arguments for usage info

Link to comment
Share on other sites

yes, most have missed something but some have gotten it :p

You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option.

Basically this is the best answer to the problem at hand. thank you.

Link to comment
Share on other sites

This is the feature I most wish they would add... Nothing more annoying than firing up the command prompt then having to kill it off and do it over...

You can't change the integrity level of a process once it's been started, so you need to launch a new instance of CMD using the "Run as Administrator" option.

It could spawn a new instance of CMD with the elevated permissions (firing up the UAC dialog and the like)...

Link to comment
Share on other sites

  • 5 months later...

yes u can go to start all programs accessories find the cmd right click run as admin now..

just remember in windows right click does alot .. and if ur on 8 maybe they changed it but in 7 vista xp right click

Yes, but as Brandon said all that does is just start a new instance...so no it does not elevate the current running CMD Prompt window.

Link to comment
Share on other sites

IF microsoft added the feature to elevate to admin CMD from standard, every virus/malware in the world would implement it and take over all machines, defeating the purpose. Think about it. ;) I mean, banking on the fact that most users don't use a limited account from the beginning of their installs...I say MOST, I myself have limited accounts on everything I own excluding my server, that I administrate, and nobody has the password to....just throwing that out there...

Link to comment
Share on other sites

IF microsoft added the feature to elevate to admin CMD from standard, every virus/malware in the world would implement it and take over all machines, defeating the purpose. Think about it. ;)

Doubtful since that same malware/virus could just invoke an admin CMD session since it would be prompted for credentials either way (in your scenario). So either way is more or less the same level of secure.

  • Like 1
Link to comment
Share on other sites

Been a while since I've been in windows 7 im used to just windows 8 and just right clicking bottom left corner and hitting command prompt admin but I think you can type cmd in the start menus search, right click it and high run as admin

Link to comment
Share on other sites

Doubtful since that same malware/virus could just invoke an admin CMD session since it would be prompted for credentials either way (in your scenario). So either way is more or less the same level of secure.

Touche, Shane. Good point. Although, behind my firewalls/security, I've never had that happen, nor do I allow my users to run in an admin space to begin with, and trust me...if you don't know my password, which is over 19 characters long, is nearly impossible to be cracked....I don't allow admin privelages on ANYTHING, except explicitly a very FEW things, most everything my users do is "in the cloud", I've steered them away from local accounts...so meh, never had any problems. It's bad admins that let/allow the bad stuff to get by, which I will not approve unless I'm physically there to see what they are doing. ;) So I am not worried. Microsoft has taught me well, when it comes down to being secure....that and previous experiences....so in other words, "I got this" on my end. Not too worried. (Scanned all my machines personally with various scanners/rootkit revealers/etc...there is no PEBKAC happening here! ;) ) Need I say, Budman, GroupPolicy...etc...self explanitory. I'm not saying it couldn't happen to someone else, it's just never happened to ME, on my domain/network. Not going to either. ;)

Link to comment
Share on other sites

Touche, Shane. Good point. Although, behind my firewalls/security, I've never had that happen, nor do I allow my users to run in an admin space to begin with, and trust me...if you don't know my password, which is over 19 characters long, is nearly impossible to be cracked....I don't allow admin privelages on ANYTHING, except explicitly a very FEW things, most everything my users do is "in the cloud", I've steered them away from local accounts...so meh, never had any problems. It's bad admins that let/allow the bad stuff to get by, which I will not approve unless I'm physically there to see what they are doing. ;) So I am not worried. Microsoft has taught me well, when it comes down to being secure....that and previous experiences....so in other words, "I got this" on my end. Not too worried. (Scanned all my machines personally with various scanners/rootkit revealers/etc...there is no PEBKAC happening here! ;) ) Need I say, Budman, GroupPolicy...etc...self explanitory. I'm not saying it couldn't happen to someone else, it's just never happened to ME, on my domain/network. Not going to either. ;)

Oh yes I wasn't saying that. I was just saying that either route provides about the same security. I wasn't questioning your practices. :)

Link to comment
Share on other sites

@Shane, and BudMan....I appreciate everything microsoft and BudMan has taught me...even though he (budman) might not have been here for me all the way, physically, but I DO take notes. Thank you for the fine, awesome job you do at microsoft, and I'll forever appreciate it. I was just saying, malware/viruses/compromistation has never bitten me in the bootay, and I don't plan on it starting now. I don't say much on neowin, but I do know that what I've learned has kept my systems MORE than secure...need I say, UAC FTW? Keep up the great work, buddy. Keep on educating people....as long as you do, it'll keep people like me and their networks secure. Not saying that anything bad couldn't happen to someone OR me...I'm sure it does, but it helps to be educated in the right prevention steps, by the right people. This is why I love neowin! Different strokes for different folks! Thank you, Shane! You should get more recognition than you do! Hey, Neowin...LISTEN TO THIS GUY! Just saying, it could stop some trouble in the future! (Thank you too, BudMan, for all of your networking skills...everything you say matters to at least someone who is worthy to listen!)

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.