Full authentication doesn’t seem available however the kon-usr drops in at the command line but KDE kicks up an authentication error when trying to start a GUI session. Linux compromise seems to be less powerful as you log in as a new kon-usr user, albeit with UID 0 for superuser privs. Discussing the issue with a Windows admin there have been a couple of potential mitigations developed, but at this point these have yet to be put to the test. I’ve successfully compromised a Windows 7 host, both local and domain acount, but it can only compromise domain accounts that have previously logged onto the physical machine.
There are plenty of videos showing Kon-Boot in action, for example this one.
KON BOOT WINDOWS 7 UPDATE
Simply extract the archive to the root of the USB drive to update chain.c32 and syslinux.cfg then you’re good to go. has a great guide for the process, but ends with the limitation that KonBoot won’t function from USB until IronGeek steps into the ring with a patch. Unetbootin continues to be a powerful tool, using which you create a bootable USB drive from the KonBoot floppy drive image. Kon-Boot is designed to boot via either floppy or CD, but thanks to the work of IronGeek it is relatively painless to get Kon-Boot running from USB. The premise of Kon-Boot is simple, by modifying the system kernel (Windows or Linux) upon boot there is no need to know the users password to access the system.
I’m running behind the curve on this one, but after several of my usual sources suggesting KonBoot as a useful addition to any security toolkit.