PDA

View Full Version : How To Bypass Windows 7 Logon Password In Three Steps



Book
19th August 2010, 12:52 PM
http://www.intowindows.com/how-to-bypass-windows-7-logon-password-in-three-steps/

How To Bypass Windows 7 Logon Password In Three Steps

:o

DMac
19th August 2010, 12:57 PM
One of my favorite boot cds...
http://fire.dmzs.com/

Heimdhal
19th August 2010, 03:13 PM
I know in XP you can usualy just go into BIOS and delete or reset all admin passwords from there. ;)

Glass
19th August 2010, 04:53 PM
I have a tool that lets me boot up and change the admin password. Then a reset and you are in. That's if you need it. Most computers are shipped with the local Admin account hidden and the password blank. Oops.. did I say that?

undgrd
19th August 2010, 05:38 PM
I know in XP you can usualy just go into BIOS and delete or reset all admin passwords from there. ;)


Totally different than windows security

Bullion_Bob
13th October 2010, 03:03 PM
One of my favorite boot cds...
http://fire.dmzs.com/




How do you use it to crack windows passwords?

Hatha Sunahara
16th November 2010, 10:09 AM
Here's a simpler way in Windows 7.

Click the Start button. In the search box type in this string: %SystemRoot%\system32\control userpasswords2

Hit Enter.

Give windows a second or two to find the dialog box.

Highlight your username in the list.

UNcheck the box at to top of the dialog box that says "Users must enter a username and password to use this computer".

Hit OK.

No additional software needed.

If you're using Windows XP, get a Microsoft 'toy' called Tweak UI, Install and configure the Auto Login tab; Does exactly the same thing.


Hatha

SLV^GLD
16th November 2010, 10:40 AM
Hatha's methods require administrative privileges to execute. It should come as no surprise that one can alter system security when working with administrative privileges.

The bootable methods are all doing the same thing and Book's link is no different. They all load the SAM hive from the registry and clear the hash for the administrator password.

There is old adage that once physical access to a machine is had then all bets are off. This just reinforces that fact. There is nothing new in this.

Dogman
16th November 2010, 11:19 AM
http://pogostick.net/~pnh/ntpasswd/

DMac
16th November 2010, 11:27 AM
Hatha's methods require administrative privileges to execute. It should come as no surprise that one can alter system security when working with administrative privileges.

The bootable methods are all doing the same thing and Book's link is no different. They all load the SAM hive from the registry and clear the hash for the administrator password.

There is old adage that once physical access to a machine is had then all bets are off. This just reinforces that fact. There is nothing new in this.


This has always been the point. When physical access is granted, security goes out the window. There isn't a product available to the public than can protect you if the attacker gets physical.

SLV^GLD
16th November 2010, 11:42 AM
Some enclosures include a "tamper switch". That is, a physical switch that is held closed by the enclosure being assembled. When the enclosure is opened so is the switch and the BIOS can react programmatically to the event. If one wished one could use the same concept to cause physically destructive reactions to the enclosure opening. While the computer may not survive the attacker may not either.

:)

At any rate, the method can be used to destroy sensitive data and not necessarily the attacker.