Forum Thread: How to Crack Window Password with Kali Live Usb

How to Crack Window Password with Kali Live Usb

Hello friends this is my first null-byte, today i am going to explain HOW TO RESET ADMIN PASSWORDS FOR WINDOWS (7,8)

Prerequisites:

bootable kali linux cd/usb

to reset windows password we will use chntpw for editing the SAM database where Windows stores password hashes.

What Is Chntpw?

chntpw is a software utility for resetting or blanking local passwords used by Windows NT, 2000, XP, Vista, 7, 8 and 8.1. It does this by editing the SAM database where Windows stores password hashes.see more on wikipedia.

What Is SAM Database?

The Security Account Manager (SAM) is a database file in Windows XP, Windows Vista and Windows 7 that stores users' passwords. More on wiki and microsoft.

Now Lets Start:

Step 1: Boot Windows Machine with the LiveCD.

select Live

open terminal

mount partition on which Windows System files are installed(C: Drive of Windows). it name could be sda1, sda3 or something like like this.

mount /dev/sda1 /mnt

Step 2: Go to Windows Password Database Directory

generally located in /Windows/System32/config/

in your System it could be like this

cd /mnt/Windows/System32/config

Step 3: Type Command Below for List Out All Users

chntpw -l SAM

Step 4: Select User Administartor by Following This Command.

chntpw -u Administrator SAM

Now It Will Open a Menu to Reset the Password.Select Right Option and Save Changes.

_This article is originally from my blog

5 Responses

Will this work for windows10 ?

work with Windows NT, 2000, XP, Vista, 7, 8 and 8.1.

Oh Ok .. Thanks for the prompt reply :)

Great tips ... But I have one question? Many people use a USB Device can I make some bootable USB with that recovery pass, who use flopy - that is old technology???

In fact, there are many free password reset tool out here like ntpassword, iseepassword and ophcrack.
https://www.iseepassword.com/
http://www.chntpw.com/guide/

Share Your Thoughts

  • Hot
  • Active