Hacking Windows Password-Lab1
Hacking Windows Password-Lab1
This works because the user can trigger Utilman by pressing Windows Key + U before
Windows logon. This will load up the Utilman.exe executable which resides in the
Windows\System32 directory. If you swap the Utilman.exe file with something else like
cmd.exe, you have access to the command prompt running SYSTEM privileges.
SYSTEM is an account with the highest possible privileges on Windows which similar to
the root account on Unix systems.
Here are the step by step instruction on how to do this.
WARNING:
You can do a lot of damage to a system if you dont know what you are doing. Technibble
accepts no responsibility if something goes wrong.
First of all, we will need a way to access the file system to swap out Utilman.exe with
something else like cmd.exe. There are a few ways to achieve this:
Remove the operating system hard drive from the target system and slave it into
another system with a working operating system. From there you can swap out the files
on the slave drive
1. To begin, boot from your Windows 7 DVD and when you reach the first screen
asking about the language, currency and keyboard format, Click Next.
On the next page, down in the lower left hand side, click on the “Repair your computer” link.
2. Next, select the “Use recovery tools that can help fix problems starting Windows.
Select an operating system to repair” option, choose an operating system from the
list and Click Next.
3. You will now have an option to “Choose a recovery tool”. Select Command
Prompt.
You should now have a Command Prompt Window open. Type in the following
commands:
4. Replace UTILMAN.exe With CMD.exe
C:\
cd windows\system32
ren utilman.exe utilman.exe.bak
copy cmd.exe utilman.exe
This will navigate to the system32 directory, rename utilman.exe to utilman.exe.bak,
make a copy of cmd.exe and name it utilman.exe.
Once the computer boots up normally, press the key combination Windows Key +
U and you should get a Command Prompt. If the Command Prompt doesnt appear,
press Alt+Tab as the Command Prompt may appear behind the Logon screen. From
here, you can run many (if not all) of the commands you can normally use in Command
Prompt.
To reset an existing users password, we need type the text below. In this example, we
will be changing JohnDoe’s password to “hunter2”.
net user JohnDoe hunter2
You should be able to log in with this new password straight away.
If you dont know what the username on the system actually is, you can see a list of the
users by typing:
net user
Reverting Changes
To restore utilman.exe, in the Command Prompt type in:
C:
cd windows\system32
del utilman.exe
ren utilman.exe.bak utilman.exe
Then reboot the system.
To remove the new user account you just created earlier, type in:
net user NewGuy /delete
That’s all there is to it.
B: Hack a Windows 7/8/10 Admin Account Password with Windows Magnifier
This how-to on hacking Windows 7/8/10 etc. admin account passwords using
Windows Magnifier is focused on adding, changing, or deleting an admin level
account on a Windows 7/8/10 etc.
Maybe you forgot or lost the password to your Windows Admin account, this
guide will help with that. If you are trying to hack the computer lab at school
then you will need a different method
Disclaimer: This is for use on a PC that you own. Breaking into someone else's
PC is considered a serious crime in most places. If you make a mistake or
change something else, your Windows may become a non-boot. If so, just undo
whatever you changed outside of the hack shown here, and it will back to
normal. Need I say this is for Educational Purposes! You are responsible for
your own thoughts and actions.
Prerequisites:
Any Linux Live CD/DVD/USB with Live option (ex. Ubuntu Live, Linux
Live, Kali, etc.).
Ability to use said Linux CD/DVD/USB.
Basic understanding of Windows file structure. i.e. can navigate.
The desire to modify user account(s) on said Windows boxen.
Physical access to said Windows box.
Ability to use BIOS if needed.
Ability to use command line and basic understanding of net user
commands.
Things to Note:
If you are trying to hack a coworker / boss / job / school / customer /
friend / spouse's account, you are screwed because they won't be able to
use the old password anymore—try explaining that.
This hack works on Windows 7, 8, 10 and basically any that have "Ease
of Access".
Servers require "net user Administrator blabla /domain".
This will destroy all data encrypted with EFS on the account if it's enabled
(you have to enable it first).
If you do not undo the hack after you change the password, you will get
the magnifier every time you use cmd or nothing at all.
If you modify or delete any other files in Sys32, your next boot up is
doomed (maybe).
Scared? You should be. Now let's get hacking.
Step 1Boot Some Flavor of Linux Live CD
Insert CD/DVD into drive and reboot the machine. Start your Live DVD. You
may need to go into the BIOS screen and change the boot-up order to CD/DVD
drive first, HDD second.
Click magnify and hit apply. Ta da. You have a system level command prompt.
At this point is where we will only change the Admin password and not any of
the 1000 other things that could be done at this point!
Add an account:
net user username password /add
Tip: If your username has a space, like John Doe, use quotes like "John Doe".
Admin that:
net localgroup administrators username /add
Delete that:
net user username /delete
1. Repeat Step 1
2. Repeat Step 2
3. Rename magnify.exe back to cmd.exe
4. Rename magnify.old back to magnify.exe
5. Log out, take out CD/DVD USB, reboot into Windows