Wut?
Having administrative access precludes the need to use this attack vector in the first place. The question is: what other methods can be used to access memory to get this key/value to THEN be able to crack the code and start creating accounts, etc.That is what I would be on the look out for.