How To Bypass Windows Password

Software used :- Offline NT Password and Registry Editor
1. The software can be downloaded from internet; 
2. Make live CD of the software and keep a USB drive ready if you want to recover the paasword..

Offline NT Password is a stripped -down version of linux with a menu-driven interface . By default, it steps you through the process of removing the Administrator password. If you choose to boot Offline NT password from CD, make sure that you first insert a USB thumb drive to to copy the SAM file to . This will make mounting it much easier.

First of all insert CD into drive and boot it.

 Offline NT Password runs in command-line mode. Once booted , it displays a menu-driven interface. In most cases, the default options will step you through mounting the primary drive and removing the Administrator account password, as described next.

Step one  The tool presents a list of drives and makes a guess as to which one contains the Windows operating system. It also detects inserted USB drives. This makes mounting them much easier, because if you insert one later, the tool often will not create the block device (/dev/sdb1) necessary to mount it. 
  In case, the boot device containing Windows is correctly identified by default so simply press ENTER to proceed.

Step Two Next the tool try to guess the location of SAM file. Now you can see that it is correctly identified as located in WINDOWS/system32/config.
  Again, the correct action is preselected from the menu by default. Before contining, however we want to copy the SAM file to the USB drive. Since Offline NT password is built on a simple Linux system, we can invoke another pseudo-terminal by pressing ALT+F2. This opens another shell with a command prompt. Mount the USB drive using the device name identified in step one.
 mount / dev/ sdb1 / mnt
Next copy the SAM and SECURITY files to USB drive. Offline NT Password mounts the boot disk in the directory /disk.

 cp / drive / WINDOWS /system32/ config/ SAM /mnt
 cp/ drive / WINDOWS / system32/ config/ SECURITY/ mnt

          Make sure you perform a directory listing of your USB drive to confirm you’ve copied the files correctly.
          Now return to the menu on pseudo-terminal one by pressing ALT+F1 , and then press ENTER to accept the default location of the SAM file.

Step Three  The tool will now look the SAM file and list the accounts. It will then give you the option to remove or replace the selected account password. By default, the Administrator account will be selected.

     Once selected, the default option is to simply remove the password, as shown next. Although there is an option to reset the password to one of your own choosing, this is not recommended because you risk computing the SAM file . Press ENTER to accept the default.

Step Four  Once the password is successfully removed from the SAM file, it must be written back to the file system. The default option will do this and report success or failure, so press ENTER.

          With the SAM file successfully written back to the file system, simply press ENTER for the default option to not try again , and the menu will exit. Remove the CD and reboot the system. You will now be able to log in as the local Administrator with no password.

NOTE: This is for educational purpose only we are not responsible for any type of inconvenience caused by reader.

Share This:


Leave a Reply

Your email address will not be published.