An easy hack for resetting the Administrator password in XP/Win7
veritas_libertas
Member Posts: 5,746 ■■■■■■■■■■
Comments
-
earweed Member Posts: 5,192 ■■■■■■■■■□Never seen it before. Could have used it a while back but it was actually easier reimaging the computer I was working on. I'm gonna bookmark that page just for future reference.No longer work in IT. Play around with stuff sometimes still and fix stuff for friends and relatives.
-
Paul Boz Member Posts: 2,620 ■■■■■■■■□□Pretty neat. It says "you don't need third party software" but you do need some type of media (in this case, Windows PE). I’d just download a 100kb Konboot .ISO and be done with it CCNP | CCIP | CCDP | CCNA, CCDA
CCNA Security | GSEC |GCFW | GCIH | GCIA
pbosworth@gmail.com
http://twitter.com/paul_bosworth
Blog: http://www.infosiege.net/ -
veritas_libertas Member Posts: 5,746 ■■■■■■■■■■Never seen it before. Could have used it a while back but it was actually easier reimaging the computer I was working on. I'm gonna bookmark that page just for future reference.
LOL, I'm actually looking at as a security issue more than fix-it trick -
earweed Member Posts: 5,192 ■■■■■■■■■□veritas_libertas wrote: »LOL, I'm actually looking at as a security issue more than fix-it trickNo longer work in IT. Play around with stuff sometimes still and fix stuff for friends and relatives.
-
rfult001 Member Posts: 407Nice. What measures can one really put in place to prevent anything like this? Other than physical barriers.
-
wedge1988 Member Posts: 434 ■■■□□□□□□□you'd have to use the tools given to you. ie. Use a gpo to disable the local admin account. Mess with the local accounts.
Disable booting from CD in bios? If you use winPE via network boot then password protect winPE.
Sounds simple, usually a git always finds something to break.~ wedge1988 ~ IdioT Certified~
MCSE:2003 ~ MCITP:EA ~ CCNP:R&S ~ CCNA:R&S ~ CCNA:Voice ~ Office 2000 MASTER ~ A+ ~ N+ ~ C&G:IT Diploma ~ Ofqual Entry Japanese -
kalebksp Member Posts: 1,033 ■■■■■□□□□□Number 3 on the 10 Immutable Laws of Security:
"If a bad guy has unrestricted physical access to your computer, it's not your computer anymore" -
docrice Member Posts: 1,706 ■■■■■■■■■■"If a bad guy has unrestricted physical access to your computer, it's not your computer anymore"
This.
Once physical access is had, it's pretty much game over. All you can do is have enough barriers already in place to discourage someone from performing an offline attack.Hopefully-useful stuff I've written: http://kimiushida.com/bitsandpieces/articles/ -
veritas_libertas Member Posts: 5,746 ■■■■■■■■■■Could this be prevented by using Software Restriction Policies?
-
rwwest7 Member Posts: 300There are much easier ways than this, but all it gets them is local admin rights. Which in a properly set up domain doesn't mean a whole hill of beans.
-
dynamik Banned Posts: 12,312 ■■■■■■■■■□Which in a properly set up domain doesn't mean a whole hill of beans.
I've done this on domain controllers. If you run a whoami you'll see that you're SYSTEM, not a local admin. -
wd40 Member Posts: 1,017 ■■■■□□□□□□Nice. What measures can one really put in place to prevent anything like this? Other than physical barriers.
with EFS Even if they manage to reset the admin account they will not be able to read any of your data files easily -
earweed Member Posts: 5,192 ■■■■■■■■■□use EFS, Bitlocker, Safeboot, truecrypt etc
with EFS Even if they manage to reset the admin account they will not be able to read any of your data files easilyPlease note that resetting the password from an account other than the corresponding user account always means that the user loses the credentials stored in the Windows Vault, stored Internet Explorer passwords, and files that you encrypted with the Encrypting File System (EFS).No longer work in IT. Play around with stuff sometimes still and fix stuff for friends and relatives.