+ Reply to Thread
Results 1 to 11 of 11
  1. Senior Member sina2011's Avatar
    Join Date
    Apr 2011
    Location
    Sydney,Australia
    Posts
    237

    Certifications
    CCNA(R&S)
    #1

    Default Windows 7 Password Recovery

    hey everyone

    I just ran into bit of a problem I have a desktop computer at home that I dont use that often it has Windows 7 on it and has a password for the user account I have forgotten my password is there any programs out there that does password recovery for windows logins??


    Thanks.
    Reply With Quote Quote  

  2. SS
  3. Senior Member Excellent1's Avatar
    Join Date
    Jun 2010
    Location
    Cornfield, USA
    Posts
    460

    Certifications
    CCNA:S, MCTS, MCITP, C|EH, CHFI, A/N/Sec+
    #2
    If there are any other accounts on the pc that are admin accounts, you can log in with the admin account and reset the password using that account (just go to users, right click the user and change password). Keep in mind that if you do that, you'll lose access to any encrypted files on that account unless you've backed up the keys (which is unlikely since you don't have a password recovery disk).

    The only other alternative is to reinstall (assuming you're not on a domain).
    Reply With Quote Quote  

  4. Senior Member kriscamaro68's Avatar
    Join Date
    Apr 2008
    Location
    Utah
    Posts
    1,164

    Certifications
    MCSA: 2012R2, MCS: Server Virtualization, MCTS-Win7, Security+, Server+, Net+, A+
    #3
    There is no need for a reinstall here. You can use a tool by microsoft called DART. This will allow you to reset the admin password. Also if you can't get that there are many other live cd programs that you can boot to out there. Also there is ophcrack which can crack the sam file and get you your password. There are lots of other tools as well. just google it and i am sure there are other tools out there that can crack the sam file.
    Reply With Quote Quote  

  5. Senior Member sina2011's Avatar
    Join Date
    Apr 2011
    Location
    Sydney,Australia
    Posts
    237

    Certifications
    CCNA(R&S)
    #4
    hey guys thanks for your replies.

    no need for any software I remembered it after thinking for 2 hours.

    thanks kriscamaro Im looking into oph crack as we speak im going to try it out later on tonight see how it works and stuff thanks for that I appreciate it.
    Reply With Quote Quote  

  6. Senior Member Dr IT's Avatar
    Join Date
    Jan 2009
    Posts
    345

    Certifications
    CCNA, MCP/MCTS,ITILv2 , Sec+ , VCA ( DCV & WM )......and miles to go b4 i sleep..
    #5
    you can use Bart PE CD or the UBCD to get this done ..

    Else as suggested using Opthcrack
    Venturing in to the Unknown

    Target 2018 : SSCP VCP- DTM

    The Difference between the Ordinary and the Extra-Ordinary is that Little " Extra ".
    Reply With Quote Quote  

  7. Junior Member Registered Member
    Join Date
    Aug 2018
    Posts
    4
    #6
    I think the best way to do that is using Kali Linux. Kali is one of the greatest operating systems we know for penetration testing. However, I had removed the Windows 7 password by using nothing but CMD, but that's kind of tricky and long process. So, the perfect way is to live boot Kali and then follow the following steps:
    Live boot into Kali.
    Open the file explorer and visit /Windows/System32/config/
    Open terminal by Right-Click>Open Terminal Here
    Type following commands one by one:

    chntpw -l SAM
    chntpw -u “username” SAM
    Done!
    Reply With Quote Quote  

  8. Senior Member
    Join Date
    Dec 2017
    Posts
    113
    #7
    Quote Originally Posted by jogh_cutts View Post
    I think the best way to do that is using Kali Linux. Kali is one of the greatest operating systems we know for penetration testing. However, I had removed the Windows 7 password by using nothing but CMD, but that's kind of tricky and long process. So, the perfect way is to live boot Kali and then follow the following steps:
    Live boot into Kali.
    Open the file explorer and visit /Windows/System32/config/
    Open terminal by Right-Click>Open Terminal Here
    Type following commands one by one:

    chntpw -l SAM
    chntpw -u “username” SAM
    Done!

    I am sure in the past 7 years the individual has gained access to the machine by now.
    Reply With Quote Quote  

  9. Senior Member scaredoftests's Avatar
    Join Date
    Dec 2013
    Location
    behind you!
    Posts
    2,455

    Certifications
    ACAS,Comp TIA Security +, Novell CNE, HDI Customer Service, ITIL Foundation, MTA
    #8
    One would hope..or else it is a great paperweight
    Never let your fear decide your fate....
    Reply With Quote Quote  

  10. Level 99 Wizard Skyliinez92's Avatar
    Join Date
    Oct 2015
    Location
    Gielinor, UK
    Posts
    554

    Certifications
    CompTIA A+ Net+ | Sec+ | MCTS: Win 7 MCP | MTA NF | MTA OSF Win10 (70-698)
    #9
    Quote Originally Posted by johndoee View Post
    I am sure in the past 7 years the individual has gained access to the machine by now.
    He has been sitting patiently by his laptop waiting for jogh_cutts reply. I hope someone has been dusting him off.
    Certification goals: 70-740, 70-741, 70-742, 70-744, VCP6.5-DCV, 70-697

    "There are 10 types of people in this world; those who understand binary and those who don't." - Anon
    Reply With Quote Quote  

  11. Junior Member Registered Member
    Join Date
    Oct 2018
    Posts
    1
    #10
    No, its called Spamming.......
    Reply With Quote Quote  

  12. Member
    Join Date
    May 2016
    Posts
    63

    Certifications
    C|EH, Network+, Security+
    #11
    Quote Originally Posted by jogh_cutts View Post
    Type following commands one by one:

    chntpw -l SAM
    chntpw -u “username” SAM
    Done!
    I typed "Done!" and I got this weird error.
    Reply With Quote Quote  

+ Reply to Thread

Social Networking & Bookmarks