Which Windows command is used to run a program with the credentials of another user?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which Windows command is used to run a program with the credentials of another user?

Explanation:
Running a program with another user's credentials means starting an application under a different security context than your current session. The Windows command that does this is Runas. You specify the target user with /user:DOMAIN\username and provide the program to run in quotes, for example: runas /user:CONTOSO\Alice "notepad.exe". It will prompt for Alice's password, unless you use /savecred to remember it for future runs, or /netonly to apply the credentials only to network access. This is handy for testing permissions or performing tasks as another user without logging in as that user. Other options don’t fit this purpose because they relate to different areas. Shims and Application Shimming modify how programs behave for compatibility, not to switch user accounts. Pivoting is a security term about moving laterally across systems, not a Windows command for launching a program under another user’s credentials.

Running a program with another user's credentials means starting an application under a different security context than your current session. The Windows command that does this is Runas. You specify the target user with /user:DOMAIN\username and provide the program to run in quotes, for example: runas /user:CONTOSO\Alice "notepad.exe". It will prompt for Alice's password, unless you use /savecred to remember it for future runs, or /netonly to apply the credentials only to network access. This is handy for testing permissions or performing tasks as another user without logging in as that user.

Other options don’t fit this purpose because they relate to different areas. Shims and Application Shimming modify how programs behave for compatibility, not to switch user accounts. Pivoting is a security term about moving laterally across systems, not a Windows command for launching a program under another user’s credentials.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy