Forgot windows password? There are a lot of ways you may find in the internet. like to reboot your computer, use some windows password tool, or try Administrator Login Backdoor. So here,

If you have no windows reset disk and do not want to reformat windows,you could also learn to crack windows password from system SAM files.

To start you are going to need a few things:

1) – Backtrack installed on your system. So you will have already downloaded the LIVE CD booted it and installed it to your hard drive in a small partition. If you are having troubles with the installation and dual boot go HERE for a tutorial on that.

2) – The rainbow table from shmoogroup. Download here: LanMan – Alpha, Numeric, Symbol14 Character Set 10Gb (They take forever to download and then decompress, but its worth it.) You can DL the file to your windows partition and decompress it there. Use 7zip to decompress the files. In fact that is how I use them in this tutorial, also it just keeps you linux partition smaller. NOTE: these tables are already sorted so you do not need to use rsort.

3)– At least a gig of RAM.

4) – The SAM and SYSTEM files from … someone’s computer (Note it is illegal to crack the passwords in files you don’t own). I reccomend putting them on a thumb drive.

5) – Pateience and Time.

Once you have done/got all of the above you are ready to start cracking:

Boot your backtrack partition. Login as root.

Insert the thumb drive (or cd if you used a cd) with the SAM and SYSTEM files that you legally aquired.

You will need to mount the thumb drive. So go into the KDE version of the “start” button. You will find it all the way in the lower left hand corner or the taskbar…its blue. Click it.

In the muen that pops up, select “System” then “info center”.

You will get a window that shows you all of the components on your machine. Select “storage devices icon. Your thumb drive will appear as an unmounted “SDB” “removable storage” drive. The path will look something like this “/mnt/sdb1″.

Select that drive and right click, in the context menu select “Mount Drive”.

Now you can access the files on the thumb drive. Close the window you just opened.

Its time to copy the “sam” and the “system” files to the temp directory:

Click the little screen icon, in the lower left hand corner of the desktop’s taskbar, to open up a BASH command shell (its a window that looks somewhat similar to the Windows “Command Prompt” window).

Type in this command: “cd /mnt/sdb_removable”

The shell should now show this as the directory “slax sdb1_removable #”

Now type these commands:

cp SAM /tmp

cp system /tmp

Keep this BASH shell open.

Note: You have just copied the “sam” and the “system” files to your tmp directory.

Now you need to get the BASH shell back into the root partition (or, more technically, running from/in the root partition).

Use/type this command:

cd root

Now you are running your BASH commands from the root directory.

The Windows hashes are in the SAM file, and they are encrypted. You need a bootkey to decrypt the SAM hashes. You can get the bootkey from the “system” file you harvested. Here’s how:

In the same BASH shell, run this command:

bkhive system key

The boot key will now appear in the BASH shell.

Now you can dump the password hashes out of the SAM file with samdump2:

Still in the same BASH shell, type this command:

samdump2 SAM key > /tmp/hashes.txt

This command just created a file called “hashes.txt” in your “tmp” directory.

Now its time to use those rainbowtables that you downloaded and decompressed.

Note: You need to know where you have them on your machine (ie you need to know the file path in linux).

To do this go back to the “info center” and right click on one of the devices that is NOT your linux partition (it will be an NTFS formated drive with alot of disc space used).

After the “right-click”, select “open in file browser” from the context menu.

If you are in the wrong device close the window that pops up and select a different device. Keep doing this until you find the device that has all the rainbowtables that you have in your Windows “C:\” directory, or wherever you have them stored.

Now find where you kept the rainbow tables. Note that in the search bar there will be a file path (much like in windows file explorer … only different).

Keep this window open.

Now, go back to (select) the BASH shell that you already have open and run this command.

rcrack mnt/sda5/rainbowtables/*.rt -f /tmp/hashes.txt


The shell will start to run crack. Because the tables are so HUGE and numerous it takes a little bit, like 10-20 minutes (remember these tables cover several symbols as well as all the alpha numeric characters)

When it finishes, the bash command will display which paswords were found,then got your lost passwords back.

Best of luck!

Relate thing: windows password key 8.0

Share this nice post:
Be Sociable, Share!

Leave a Reply