How to Crack Window Password with Kali Live Usb

May 7, 2016 02:48 PM
Sep 20, 2016 07:53 PM

Hello friends this is my first null-byte, today i am going to explain HOW TO RESET ADMIN PASSWORDS FOR WINDOWS (7,8)

Prerequisites:

bootable kali linux cd/usb

to reset windows password we will use chntpw for editing the SAM database where Windows stores password hashes.

What Is Chntpw?

chntpw is a software utility for resetting or blanking local passwords used by Windows NT, 2000, XP, Vista, 7, 8 and 8.1. It does this by editing the SAM database where Windows stores password hashes.see more on wikipedia.

What Is SAM Database?

The Security Account Manager (SAM) is a database file in Windows XP, Windows Vista and Windows 7 that stores users' passwords. More on wiki and microsoft.

Now Lets Start:

Step 1: Boot Windows Machine with the LiveCD.

select Live

open terminal

mount partition on which Windows System files are installed(C: Drive of Windows). it name could be sda1, sda3 or something like like this.

mount /dev/sda1 /mnt

Step 2: Go to Windows Password Database Directory

generally located in /Windows/System32/config/

in your System it could be like this

cd /mnt/Windows/System32/config

Step 3: Type Command Below for List Out All Users

chntpw -l SAM

Step 4: Select User Administartor by Following This Command.

chntpw -u Administrator SAM

Now It Will Open a Menu to Reset the Password.Select Right Option and Save Changes.

_This article is originally from my blog

Comments

No Comments Exist

Be the first, drop a comment!