• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

How to recover WinXP password?

I just used a program to reset mine......I gotta figure out where I got it.....give me a little time and I'll see if I can find it for you...it works! It works with nt4.0/2000/xp.....
 
its so nice too know microsoft made it way too easy to hack the password system. Well atleast I know what I need to do next time I need to hack my roommates comp when he's out of town 😀
 
Originally posted by: RadioActiveMan666
its so nice too know microsoft made it way too easy to hack the password system. Well atleast I know what I need to do next time I need to hack my roommates comp when he's out of town 😀

though I'm no fan of MS, its not that hard in linux either....

1. Start your computer. At the LILO prompt, type "linux single." Your machine will now start in single user mode.
2. Type "passwd" and enter the password that you want for your root user. It should then say "all tokens updated successfully."
3. You can now restart the machine shutdown, for now. When the machine restarts, you will be able to log in as root with the new password.

exploiting a box when your physically at the terminal is always much easier.
 
Originally posted by: Need4Speed
Originally posted by: RadioActiveMan666
its so nice too know microsoft made it way too easy to hack the password system. Well atleast I know what I need to do next time I need to hack my roommates comp when he's out of town 😀

though I'm no fan of MS, its not that hard in linux either....

1. Start your computer. At the LILO prompt, type "linux single." Your machine will now start in single user mode.
2. Type "passwd" and enter the password that you want for your root user. It should then say "all tokens updated successfully."
3. You can now restart the machine shutdown, for now. When the machine restarts, you will be able to log in as root with the new password.

exploiting a box when your physically at the terminal is always much easier.


Dang..is it really that easy..man now thats a trick i'd like to remember the next time i am trying to hack a linux machine..which is never..but still..its nice to know..
 
Originally posted by: elzmaddy
Do you know if email and encrypted files will still be accessible after doing this?

Files encrypted with EFS under WinXP will NOT be accessible after cracking the password.

Insofar as e-mail is concerned, that would depend much upon which e-mail client is being used and which of its security features, if any, have been enabled.

- prosaic
 
This is why "Physical Security" (preventing direct access) is way high on the list of how to protect a system.

.02

Scott

 
Originally posted by: Need4Speed


though I'm no fan of MS, its not that hard in linux either....

1. Start your computer. At the LILO prompt, type "linux single." Your machine will now start in single user mode.
2. Type "passwd" and enter the password that you want for your root user. It should then say "all tokens updated successfully."
3. You can now restart the machine shutdown, for now. When the machine restarts, you will be able to log in as root with the new password.

exploiting a box when your physically at the terminal is always much easier.

its also much easier if u can rip the box off the rack, stuff it down your pants and walk home with it! jk

can you do somethign similar with Grub boot loader?


 
Originally posted by: groovin

can you do somethign similar with Grub boot loader?

as long as the bootloader is not passwd protected, it wont matter if its lilo or grub....the key is to boot into single user mode.


its also much easier if u can rip the box off the rack, stuff it down your pants and walk home with it! jk

🙂 is that a linux box in your pants or are u just happy to see me?
the point i was making, was that any box that is not physically secured first, is an easy target.
 
Actually, single-user mode still requires a password for most modern distros. It depends on how the inittab is set up. But you can accomplish effectively the same thing with "init=/bin/bash".
 
Originally posted by: prosaic
Originally posted by: elzmaddy Do you know if email and encrypted files will still be accessible after doing this?
Files encrypted with EFS under WinXP will NOT be accessible after cracking the password. Insofar as e-mail is concerned, that would depend much upon which e-mail client is being used and which of its security features, if any, have been enabled. - prosaic

Not true. Your user account password is not used in EFS beyond the generation of the cert. The first time you encrypt a file using the EFS, Windows automatically generates a cert with a public/private key. The EFS is implemented using a public/private key encryption. You can view your cert if you want by loading the Certificates Snap-in in the mmc. It should be under: Certificates - Current User -> Personal -> Certificates
 
Originally posted by: cleverhandle
Actually, single-user mode still requires a password for most modern distros. It depends on how the inittab is set up. But you can accomplish effectively the same thing with "init=/bin/bash".

yes. youre right...linux init=/bin/sh or init=/bin/bash will probaly work too...you'd have to mount the root file system then. you could also use the rescue cd and/or floppy distro to mount the root and then edit the passwd/shadow file
 
this program would not work if i wanted to use a guest account to change the administrator password on windows would it????, and, just a note, the guest has like NO privilage, just making new folder, and putting exe's on the machine, not installing anything, just wondering 🙂
 
Originally posted by: KraziKid
Originally posted by: prosaic
Originally posted by: elzmaddy Do you know if email and encrypted files will still be accessible after doing this?
Files encrypted with EFS under WinXP will NOT be accessible after cracking the password. Insofar as e-mail is concerned, that would depend much upon which e-mail client is being used and which of its security features, if any, have been enabled. - prosaic

Not true. Your user account password is not used in EFS beyond the generation of the cert. The first time you encrypt a file using the EFS, Windows automatically generates a cert with a public/private key. The EFS is implemented using a public/private key encryption. You can view your cert if you want by loading the Certificates Snap-in in the mmc. It should be under: Certificates - Current User -> Personal -> Certificates

Huh? It's handled differently in WinXP than it is in Win2000, at least it seems to be handled differently. If anyone but the owner of the account changes the password the certificates are no longer valid (unless a recovery agent was specified). Right? Or are we not talking about the same thing. I just worked 52 hours straight, so I may not be firing on all 8 cylinders.

- prosaic
 
Back
Top