#15356 - 08/15/02 03:43 PM
Re: win XP administrator
|
Joined: Mar 2002
Posts: 96
wizzy
The other other white meat
|
The other other white meat
Joined: Mar 2002
Posts: 96
Iowa
|
does he have his account password protected? if not just log on his name and change your account to an admin too. if he has a password on it, download a keylogger and get his password from that, than log on and change your account.
Gizmo: Wizzy is SeXor Gizmo: Wizzy is the other half of my Gizzy
|
|
|
#15360 - 08/15/02 05:42 PM
Re: win XP administrator
|
Joined: Mar 2002
Posts: 1,041
Infinite
UGN Elite Poster
|
UGN Elite Poster
Joined: Mar 2002
Posts: 1,041
Canada eh
|
There's a file in the %systemroot%\WINDOWS\system32\config folder called SAM Dude, I told ya where to find it. %systemroot% is a way of saying 'whatever drive your windows dir is on', usually the C:\ drive. Go look in there and/or where I said the backup copy was/is. As well read the instructions for that program, just running things blindly will get you absolutely nowhere. sum
|
|
|
#15361 - 08/15/02 05:50 PM
Re: win XP administrator
|
Joined: Mar 2002
Posts: 1,041
Infinite
UGN Elite Poster
|
UGN Elite Poster
Joined: Mar 2002
Posts: 1,041
Canada eh
|
Here, READ THIS FROM TOP TO BOTTOM!!! PWDUMP2 README Those are the exact instructions to do what you want. READ IT. And after you read it, READ IT AGAIN to make sure you understand it. If you still don't understand it after that then you shouldn't be messing with this [censored]. sum
|
|
|
#15363 - 08/16/02 06:36 PM
Re: win XP administrator
|
Joined: Mar 2002
Posts: 185
Mornse
Member
|
Member
Joined: Mar 2002
Posts: 185
Vancouver
|
A way that may be easier that I did once when I forgot the admin pass on my NT box (heh, yeah, shutup), was to boot to a floppy, you'll need to use NTFSDOS if your drive is using NTFS, otherwise just boot to a floppy and copy the SAM file to the floppy because the system won't be using it when you are running from the floppy. Then crack the file using LC3 from http://www.l0pht.com (that's a zero)
|
|
|
#15365 - 08/17/02 07:14 PM
Re: win XP administrator
|
Joined: Mar 2002
Posts: 1,041
Infinite
UGN Elite Poster
|
UGN Elite Poster
Joined: Mar 2002
Posts: 1,041
Canada eh
|
Well it looks like I need to take a little of my own advice. After glancing through the readme file myself I noticed something I have overlooked. You need the SeDebugPrivilege for it to work. By default, only Administrators have this right, so this program does not compromise NT security. So it would appear that this won't help you at all paleothol. /me tries to remove foot from mouth and swallow his pride in one motion So, paleothol, I guess I should apologize for being short with you when the info I was giving you wouldn't even help you anyways. Sorry paleothol. sum
|
|
|
#15366 - 10/13/02 05:58 AM
Re: win XP administrator
|
Joined: Oct 2002
Posts: 10
Satori
Junior Member
|
Junior Member

Joined: Oct 2002
Posts: 10
San Antonio, Texas
|
No fear, paleothol. What you need is a handy Linux bootdisk with a handy binary on it that will do the hard work for you. The one I'm about to point you to will enumerate the user accounts and let you modify their passwords. What I'd recomend that you do is set a new password for the Administrator account, login as such and add your user account to the Administrator group, and then log in as you. Make sure that you log in and out again as yourself so that your dad doesn't boot up to find the Administrator account as last logon! Keep in mind, this assumes that he is using an account with Admin privs, but that isn't Administrator. If you change HIS password, he's obviously gonna know about it. Anyway, this tool actually works with SYSKEY encryption now - pretty handy. Select the "reset NT Password" from the list of bootdisks. Enjoy!
|
|
|
|
Forums41
Topics33,701
Posts68,795
Average Daily Posts0
|
Members2,173
Most Online1,567 Apr 25th, 2010
|
|
|
Okay WTF?
by HenryMiring on 09/27/17 08:45 AM
|
|
|
|
|
|
|
|