takeown

Takes ownership of a file

Takes ownership of a file


takeown

  • C:\Windows\system32\takeown.exe /?

Output:


TAKEOWN [/S system [/U username [/P [password]]]]
        /F filename [/A] [/R [/D prompt]]

Description:
    This tool allows an administrator to recover access to a file that
    was denied by re-assigning file ownership.

Parameter List:
    /S           system          Specifies the remote system to
                                 connect to.

    /U           [domain\]user   Specifies the user context under
                                 which the command should execute.

    /P           [password]      Specifies the password for the
                                 given user context.
                                 Prompts for input if omitted.

    /F           filename        Specifies the filename or directory
                                 name pattern. Wildcard "*" can be used
                                 to specify the pattern. Allows
                                 sharename\filename.

    /A                           Gives ownership to the administrators
                                 group instead of the current user.

    /R                           Recurse: instructs tool to operate on
                                 files in specified directory and all
                                 subdirectories.

    /D           prompt          Default answer used when the current user
                                 does not have the "list folder" permission
                                 on a directory.  This occurs while operating
                                 recursively (/R) on sub-directories. Valid
                                 values "Y" to take ownership or "N" to skip.

    /SKIPSL                      Do not follow symbolic links.
                                 Only applicable with /R.

    /?                           Displays this help message.

    NOTE: 1) If /A is not specified, file ownership will be given to the
             current logged on user.

          2) Mixed patterns using "?" and "*" are not supported.

          3) /D is used to suppress the confirmation prompt.

Examples:
    TAKEOWN /?
    TAKEOWN /F lostfile
    TAKEOWN /F \\system\share\lostfile /A
    TAKEOWN /F directory /R /D N
    TAKEOWN /F directory /R /A
    TAKEOWN /F *
    TAKEOWN /F C:\Windows\System32\acme.exe
    TAKEOWN /F %windir%\*.txt
    TAKEOWN /S system /F MyShare\Acme*.doc
    TAKEOWN /S system /U user /F MyShare\MyBinary.dll
    TAKEOWN /S system /U domain\user /P password /F share\filename
    TAKEOWN /S system /U user /P password /F Doc\Report.doc /A
    TAKEOWN /S system /U user /P password /F Myshare\*
    TAKEOWN /S system /U user /P password /F Home\Logon /R
    TAKEOWN /S system /U user /P password /F Myshare\directory /R /A

Return Code: 0


C:\Windows\system32\takeown.exe
c:\>ver
Microsoft Windows [Version 10.0.19045.2075]
FileInfo
File Size66560bytes
Creation Time2019/12/07 18:09:30
LastWrite Time2019/12/07 18:09:30
ProductVersion10.0.19041.1
FileVersion10.0.19041.1 (WinBuild.160101.0800)
HashValue
MD5d258a76aa885cbbcae8c720cd1c284a5
SHA185a080da6c5a908c4c5973bf429d63b975b85109
SHA22406734bea9598d76a270db260bf4743e964ee03e297fccdc939b952ca
SHA25657b3cfa9993e52866a2fb489edf079bf4f1c78fa7525bdf59affa8f9cb4023f8
SHA384c3f315a757a2471ff8ef75a6d708104d92ae45f275f91a2af2885bb2224a1a41ce45c903bb97bf2b169894d0be0b931a
SHA512ffae4a77862dcfa7afc358bfa72183a3de1741215878fbc476c65fb6e4c456b3ceec957e4d7f7a0cf43b2852d5cfe4ae96cb3739c93d63f73f3b6c153cf22d1e
Built with Hugo
Theme Stack designed by Jimmy