Forum Thread: How to Crack Window Password with Kali Live Usb

Hello friends this is my first null-byte, today i am going to explain HOW TO RESET ADMIN PASSWORDS FOR WINDOWS (7,8)

Prerequisites:

bootable kali linux cd/usb

to reset windows password we will use chntpw for editing the SAM database where Windows stores password hashes.

What Is Chntpw?

chntpw is a software utility for resetting or blanking local passwords used by Windows NT, 2000, XP, Vista, 7, 8 and 8.1. It does this by editing the SAM database where Windows stores password hashes.see more on wikipedia.

What Is SAM Database?

The Security Account Manager (SAM) is a database file in Windows XP, Windows Vista and Windows 7 that stores users' passwords. More on wiki and microsoft.

Now Lets Start:

Step 1: Boot Windows Machine with the LiveCD.

select Live

open terminal

mount partition on which Windows System files are installed(C: Drive of Windows). it name could be sda1, sda3 or something like like this.

mount /dev/sda1 /mnt

Step 2: Go to Windows Password Database Directory

generally located in /Windows/System32/config/

in your System it could be like this

cd /mnt/Windows/System32/config

Step 3: Type Command Below for List Out All Users

chntpw -l SAM

Step 4: Select User Administartor by Following This Command.

chntpw -u Administrator SAM

Now It Will Open a Menu to Reset the Password.Select Right Option and Save Changes.

_This article is originally from my blog

10 Responses

Will this work for windows10 ?

work with Windows NT, 2000, XP, Vista, 7, 8 and 8.1.

Oh Ok .. Thanks for the prompt reply :)

Great tips ... But I have one question? Many people use a USB Device can I make some bootable USB with that recovery pass, who use flopy - that is old technology???

In fact, there are many free password reset tool out here like ntpassword, iseepassword and ophcrack.
https://www.iseepassword.com/
http://www.chntpw.com/guide/

I find a new way to crack Windows password using Windows installation CD.
Steps:
Boot from Windows Installation CD (or use any other OS which allows you to read/write to NTFS)
Copy utilman.exe somewhere else.
Copy cmd.exe to utilman.exe
Boot to windows
Click on the pizza icon.
Type net user <username> <newpassword>

I do it all the time. (I repair PCs). Works great. Will not work with bitlocker encryption.
Source: https://www.top-password.com/knowledge/reset-windows-10-password-without-reset-disk.html

Thanks for your post and support, I also was looking my windows key password, But I recently bought license key to upgrade my windows 10 home to pro version, which worked perfectly.

So I'll recommend you to get cheap windows 10 product keys from ODosta Store
Thanks for your providing this informative content here.
I'm sharing some product keys for others here;
NPRFF-HJCWJ-QXVR3-XYFPX-3RTGC
NVJ37-87Y93-43TQV-XTVXV-6XX2P
JT8QJ-KNQ4X-FKT4M-DYYP6-PDK2P

Good tutorial. However, it is worth pointing out that this only works 100% with versions of Windows before Windows 8.

Windows 8 and 8.1 use a modified version of hibernation at shutdown. This prevents write access to files on the disk and makes this method unusable.

If you have come across this issue, the following command will allow you write access:

WARNING - IF YOU ARE TRYING TO ACCESS A WINDOWS PARTITION THAT WAS HIBERNATED AND NOT SHUT DOWN, ANY UNSAVED WORK WILL BE DELETED

ntfsfix /dev/sd# >>>>>> where # is the number corresponding with the Windows partition you are attempting to access. Best of luck!

"Looks can only get you so far, but good manners can take you around the world."

Richard
Aspiring Software Developer and Computer Technician
Website: www.codingfanatic.com
Twitter: https://twitter.com/rclarkecf
Soundcloud: https://soundcloud.com/ambitouscm

Share Your Thoughts

  • Hot
  • Active