It is very simple, don't take any tension at all...
1. Open command prompt (Start->Run->cmd),
2. Enter the following command, then press ENTER
3. Enter the followin command, then press ENTER:
compmgmt.msc
This should open the computer management console.
4. Go to local users & groups->users. Right click on any user and select "set password".
If you get a "access denied" do the following:
start>run>cmd
then use following commands
1) net user test /add (this command will make test named user)
2) net localgroup administrators test /add (this command will make test user as administrators rights)
and use net user command to reset your admin. password
Alternative
What if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..
Start >> Run >> [type]cmd // this will open your command prompt
[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)
// for e.g. : net user HOME *(press enter)
[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works..
// for e.g. : password changed successfully.
2007-08-04 02:27:38
·
answer #1
·
answered by Anonymous
·
0⤊
1⤋
You need to download Hirens boot disk from here:
http://www.hiren.info/pages/bootcd
All the instructions on how to burn to CD are included on the web page.
Obviously if you cannot get into your PC then you will need to do this from another computer.
There are no links for download on the web site - you will need to email Hiren and he will send you the current link.
Once you get the CD sorted you will need to put it in the CD drive on your PC and hopefully if all your BIOS settings are enabled it will boot from the CD.
You will get alot of options once in there but if my memory serves me rightly there will be a catagory for "password recovery". Just follow the instructions from there - if you are lucky it will display the password. If not it will let you erase the password so it is just blank.
2007-08-04 03:20:26
·
answer #2
·
answered by the thinker 3
·
0⤊
0⤋
decision a million(least perplexing) a million.Reboot your laptop in secure mode. 2.once you get into the boot show screen pass into "Administrator" (in XP, press ctrl+alt+del, then style administrator in) 3.pass to the commencing up Menu 4.Press administration Panel 5.Press person debts 6.exchange password of needed person decision 2 (opt for yet another comp) a million.basically pass on google 2 style in EBCD 3 get carry of the record from the 1st link.(keep it in needed folder (would desire to)) 6 Burn a CD from between the records. ****communicate over with weblink under. desire this helps reason it did for me.
2016-10-01 09:23:55
·
answer #3
·
answered by ? 4
·
0⤊
0⤋
I know that this topic has been covered by others on more than one occasion, but I figured I'd go over it yet again and throw in an update or two. Let me start with what this is all about: SAM Files & NT Password Hashes.
NT Password Hashes - When you type your password into a Windows NT, 2000, or XP login Windows encrypts your password using an encryption scheme that turns your password into something that looks like this:
7524248b4d2c9a9eadd3b435c51404ee
This is a password Hash. This is what is actually being checked against when you type your password in. It encrypts what you typed and bounces it against what is stored in the Registry and/or SAM File.
SAM File - Holds the user names and password hashes for every account on the local machine, or domain if it is a domain controller. Simple enough wouldn't you say?
§ Where do I find the SAM/Hashes?
You can find what you're looking for in several locations on a given machine.
It can be found on the hard drive in the folder %systemroot%system32config. However this folder is locked to all accounts including Administrator while the machine is running. The only account that can access the SAM file during operation is the "System" account.
You may also be able to find the SAM file stored in %systemroot% epair if the NT Repair Disk Utility a.k.a. rdisk has been run and the Administrator has not removed the backed up SAM file.
The final location of the SAM or corresponding hashes can be found in the registry. It can be found under HKEY_LOCAL_MACHINESAM. This is also locked to all users, including Administrator, while the machine is in use.
So the three locations of the SAMHashes are:
- %systemroot%system32config
- %systemroot% epair (but only if rdisk has been run)
- In the registry under HKEY_LOCAL_MACHINESAM
§ Obtaining the SAMPassword Hashes
Wow, how wonderful. Now we know where the goods are, and the problem is this... "How do I get my hands on those hashes?" The answer is "One of four ways."
1) Probably the easiest way to do this is to boot your target machine to an alternate OS like NTFSDOS or Linux and just copy the SAM from the %systemroot%system32config folder. It's quick, it's easy, and it's effective. You can get a copy of NTFSDOS from Sysinternals(http://www.sysinternals.com) The regular version of NTFSDOS is freeware, which is always nice, but only allows for Read-Only access. This should be fine for what you want to do, however, if you're the kind of person that just has to have total control and has some money to burn. NTFSDOS Pro, which is also by Sysinternals has read/write access but it'll cost you $299.
2) Once again, you may be able to obtain the SAM from %systemroot% epair if rdisk has been run and you are lucky enough to have a sloppy admin.
3) You can also get password hashes by using pwdump2. pwdump uses .DLL injection in order to use the system account to view the password hashes stored in the registry. It then pulls the hashes from the registry and stores them in a handy little text file that you can then import into a password cracking utility like l0phtcrack.
4) The final way to obtain password hashes is to listen directly to the network traffic as it floats by your computer and grab hashes using the above mentioned l0phtcrack.
§ Cracking Password Hashes
With the hashes in hand and an eagerness to find out what passwords lie waiting. Let's get cracking. While there are numerous programs available for the use of password cracking I will quickly cover two of the most popular ones.
John the Ripper - John the Ripper is to many, the old standby password cracker. It is command line which makes it nice if you're doing some scripting, and best of all it's free. The only real thing that JtR is lacking is the ability to launch Brute Force attacks against your password file. But look at it this way, even though it is only a dictionary cracker, that will probably be all you need. I would say that in my experience I can find about 85-90% of the passwords in a given file by using just a dictionary attack. Not bad, not bad at all.
L0phtCrack - Probably the most wildly popular password cracker out there. L0phtCrack is sold by the folks at @Stake. And with a pricetag of $249 for a single user license it sure seems like every one owns it. Boy, @Stake must be making a killing. :) This is probably the nicest password cracker you will ever see. With the ability to import hashes directly from the registry ala pwdump and dictionary, hybrid, and brute-force capabilities. No password should last long. Well, I shouldn't say "no password". But almost all will fall to L0phtCrack given enough time.
§ Injecting Password Hashes into the SAM
Probably one of my favorite and easiest ways to gain Administrator privileges on a machine, is by injecting password hashes into the SAM file. In order to do this you will need physical access to the machine and a brain larger than a peanut. Using a utility called "chntpw" by Petter Nordhal-Hagen you can inject whatever password you wish into the SAM file of any NT, 2000, or XP machine thereby giving you total control. I would suggest backing up the SAM file first by using an alternate OS. Go in, inject the password of your choosing. Login using your new password. Do what you need to do. Then restore the original SAM so no one knows you were there.
2007-08-04 02:23:36
·
answer #4
·
answered by rahul_gvli 1
·
0⤊
2⤋
Without the password your stuck you will never get in just try to think of what you might have put did you set a clue if so go to your clue it might just remind you what it is.
2007-08-06 09:51:49
·
answer #5
·
answered by Anonymous
·
0⤊
0⤋
Download RockXP - that may help. From: http://www.rockxp.org/ If you're completely locked out of your computer - you can only reformat - make sure your computer boots from CD and boot from your XP disk and delete the partition and follow the instructions. But you will lose all data.
2007-08-04 02:13:57
·
answer #6
·
answered by Mike10613 6
·
0⤊
2⤋
Use a livedistro like Hirens Boot CD or UBCD4win.
2007-08-04 02:12:50
·
answer #7
·
answered by Darrell 4
·
0⤊
0⤋
If you have other users with admin privledges you can then use that access to change the admin password to one you know. Otherwise you may be in trouble.
2007-08-04 02:09:07
·
answer #8
·
answered by GTB 7
·
0⤊
2⤋
login using safemode
2007-08-07 10:14:46
·
answer #9
·
answered by DMKNIGHTS 4
·
0⤊
0⤋