我有一台全新的Windows 7计算机,安装了操作系统,创建了一个帐户,忘记了密码。我能做什么?
没有外部CD,操作系统是从计算机内部的某个位置加载的。
我已经尝试过记住密码,并尝试过使用大写锁定,数字锁定等所有可能组合的所有候选项。
我有一台全新的Windows 7计算机,安装了操作系统,创建了一个帐户,忘记了密码。我能做什么?
没有外部CD,操作系统是从计算机内部的某个位置加载的。
我已经尝试过记住密码,并尝试过使用大写锁定,数字锁定等所有可能组合的所有候选项。
Answers:
chntpw
应用程序将其重置有关使用这三种方法中任何一种的详细说明,请参见此处。
如果您可以找到Microsoft ERD 6.5或7.0引导盘,则可以重置Windows 7密码。它必须与32位或64位Windows 7的位版本匹配才能工作。
ERD(紧急修复光盘)启动盘是DaRT(诊断和恢复工具集)的一部分,DaRT是MDOP(Microsoft桌面优化包)的一部分。这些不是对公众可用的,但是可以找到。
ERD当前有五个版本:
对于Windows 7,还有另一种方法。您只需要Windows 7安装盘,系统修复盘或硬盘驱动器上的WinRE分区即可。
使用F8光盘或从光盘启动。RE加载后,选择“修复计算机”,然后加载命令提示符并运行这两个命令。第二个命令将提示您覆盖;说“是”。
copy c:\windows\system32\sethc.exe c:\
copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe
重新启动电脑。当您到达登录屏幕时,按Shift五次键。将打开一个命令窗口。输入以下内容:
净用户 (键入帐户名称)(键入任何密码)
并按下Enter键,并在提示您覆盖时,键入“是”,然后Enter再次按下键,然后关闭命令窗口,并使用刚创建的新密码登录。
之后,您可能需要将原始的粘性密钥文件放回原处,因此,继续使用先前使用的修复CD或USB引导PC,然后在命令提示符窗口中键入以下内容:
copy c:\sethc.exe c:\windows\system32\sethc.exe
按Enter,然后在系统提示“覆盖”时,键入“是” Enter,然后再次击键,然后关闭窗口,然后重新启动PC。
或者,如果您更喜欢第三方密码破解程序,那么这是一个不错的 “从NT3.5到Windows 8.1进行测试,包括服务器版本(如2003、2008和2012。还支持64位窗口)。”
net user administrator /active:yes
运行Ophcrack LiveCD尝试破解密码,前提是您具有足够容易的字母数字密码。
使用该启动磁盘启动具有Windows操作系统的PC,以清空LOCAL
用户帐户密码ENABLE
或DISABLE
LOCAL用户帐户等。
如果您忘记了LOCAL
Windows用户帐户密码,已经在Windows操作系统上进行了出厂重新映像/重置,并且该帐户的密码不知道密码是什么,那么您可以使用此密码。因此,您可以使用某个帐户登录Windows,而无需输入密码,而只是为了获得密码,然后从Windows控制面板等中将密码设置为您以后知道的内容。
简要步骤
下载启动盘映像文件
将启动盘映像文件刻录到介质(例如USB
或CD
)上,以从中启动PC,而不是从硬盘驱动器或Windows启动。
将新刻录的启动盘媒体放入PC,然后指示PC从其启动,而不是从装有Windows的内部硬盘驱动器启动。
请按照以下部分中的指示进行操作,以INSTRUCTIONS ONCE BOOTED TO
选择要使用的选项等,以启用现有的本地Windows帐户和/或清空这些帐户的密码,依此类推。
资源:http : //pogostick.net/~pnh/ntpasswd/bootdisk.html
脱机Windows密码和注册表编辑器,启动盘/ CD
我整理了一张CD或USB驱动器映像,其中包含在大多数系统上重置密码所需的内容。
引导磁盘应支持大多数较常用的磁盘控制器,并且应自动加载其中的大多数磁盘控制器。PS / 2和USB键盘均受支持。
从NT3.5到Windows 8.1或多或少经过了测试,包括服务器版本(如2003、2008和2012)。还支持64位窗口。
危险将鲁宾逊!
如果在具有EFS加密文件的用户上重置密码,并且系统是XP或更高版本,则该用户的所有加密文件将无法读取!除非再次记住旧密码,否则无法恢复。如果您不知道是否有加密文件,则很可能没有。(也许在公司系统上除外)
通过电子邮件将问题发送给我之前,请参阅下面的常见问题和版本历史记录。谢谢!
资源:http : //pogostick.net/~pnh/ntpasswd/bootdisk.html
下载
注意:某些链接可能不在站点内。
CD发行,请参阅以下有关如何使用的信息
cd140201.zip(〜18MB)-可引导CD映像。
usb140201.zip(〜18MB)-USB安装文件
先前版本:
cd110511.zip(〜4MB)-可引导CD映像。
usb110511.zip(〜4MB)-USB安装文件
USB zip内的文件与CD上的文件完全相同。有关如何使USB磁盘可引导的说明,请参见下文。
软盘发行版(不再更新),请参阅下文以了解如何使用它们
- bd080526.zip(〜1.4M)- 引导盘映像
- drivers1-080526.zip (〜310K)-磁盘驱动程序(主要是PATA / SATA)
- drivers2-080526.zip (〜1.2M)-磁盘驱动程序(主要是SCSI)
有时可能会在这里找到早期版本(也是我的网站)
注意:0704xx之前的版本将损坏VISTA / win7 / 8上的磁盘!
请注意,引导盘包含密码,并且从您所在国家/地区重新导出它可能是非法的。
资源:http : //pogostick.net/~pnh/ntpasswd/bootdisk.html
如何使用?
在向我发送问题之前,请阅读walthrough(现在有点过时了,很抱歉)和FAQ。
如果您有CD或USB,则包含所有驱动程序。
总览
- 让机器从CD或USB驱动器启动。
- 加载驱动程序(通常是自动的,但可以运行手动选择)
- 选择磁盘,告诉哪个磁盘包含Windows系统。(可选)您将必须加载驱动程序。
- 选择PATH,系统在磁盘上的哪个位置?(现在通常是自动的)
- 选择文件,根据您要执行的操作来加载注册表的哪些部分。
- 密码重置或其他注册表编辑。
- 写回磁盘(将要求您)
不要惊慌!-大多数问题通常可以使用[括号]中给出的默认答案来回答。只需按Enter /回车即可接受默认答案。
演练和说明现在位于其自己的页面上!但是已经很老了..希望再做一个..
有什么问题吗?
好。实际上有很多东西。但是大多数问题属于“找不到”类型。然后什么也没有发生。
另外,请参阅常见问题解答以获取常见问题的帮助。
最好打印这些说明,然后再从该打印副本开始执行-并从网站资源URL上的版本开始打印,以防万一,因为自从我在此发表之后,他们对此进行了更新。
这是详细说明了引导盘开始引导以查找并指向内部硬盘驱动器并选择当前Windows OS对象以清空硬盘驱动器上该Windows OS上的LOCAL用户帐户后应选择的选项的详细信息。
这部分乍看起来可能很复杂或涉及到,但是只要让启动盘启动并通过屏幕,直到提示或等待您告诉它该做什么为止。查看这些说明,然后按照说明选择适当的选项,这应该是有道理的,因此请仔细阅读,直到获得为止。
通常,尽管您会。。。
一种。在引导磁盘检查的硬盘驱动器上选择Windows磁盘分区
b。从找到的用户名列表中,键入要更改的帐户的名称(例如,管理员,jsmith等)
C。从下一个列表中,它会告诉您该帐户是否被禁用,已过期等,因此您知道需要进行哪些更改以重置该帐户,以专门确保在重新启动Windows之后可以登录该帐户。
d。在下一个屏幕上,您将要解锁该帐户,清空该帐户的密码或将帐户设置为本地管理员(选项1、3和4)。
一世。您可能需要执行步骤“ d”。每个操作一次,然后如果需要完成多个操作(例如,空白密码,解锁帐户等),则再次选择帐户的用户名进行下一个操作
ii。我只是避免在这里设置密码,一旦以管理员身份使用空白密码登录Windows,就可以通过Windows控制面板进行设置。
e。确保选择“ Y”将所做的更改保存到计算机,然后在PC重新引导时使其重新引导到Windows,然后使用空白密码登录到使用引导磁盘更改的帐户。
如果它不起作用,请引导至启动磁盘,然后再次执行此操作,也许您没有选择某些选项,因此它没有达到您期望的效果。由于您无论如何都在工厂擦拭此硬盘驱动器,因此,松动或损坏任何东西不会有太大的危险,因为您只需重新映像/出厂重置即可。
资源:http : //pogostick.net/~pnh/ntpasswd/walkthrough.html
Offline NT Password & Registry Editor, Walkthrough
2014, NOTE: This is now a bit old, some are the same, some look a bit different..
The following is a walkthrough of using the CD to reset one user (admin) on a test Vista computer.
Insert the CD and convince your BIOS that it should boot from it. How to boot from a CD varies from computer make to computer make, so I cannot help you much. Some BIOS shows a boot device select menu if you press ESC, F8, F11 or F12 or something like that during the self test. (some even tell you on the screen what to press)
If it boots, you should see this:
ISOLINUX 3.51 2007-06-10 Copyright (C) 1994-2007 H. Peter Anvin
*************************************************************************** * * * Windows NT/2k/XP/Vista Change Password / Registry Editor / Boot CD * *
* * (c) 1998-2007 Petter Nordahl-Hagen. Distributed under GNU GPL v2 * *
* * DISCLAIMER: THIS SOFTWARE COMES WITH ABSOLUTELY NO WARRANTIES! * * THE AUTHOR CAN NOT BE HELD RESPONSIBLE FOR ANY DAMAGE * * CAUSED BY THE (MIS)USE OF THIS SOFTWARE
* * * * More info at: http://pogostick.net/~pnh/ntpasswd/ * * Email : pnh@pogostick.net * * * * CD build date: Sun Sep 23 14:15:35 CEST 2007 * ***************************************************************************
Press enter to boot, or give linux kernel boot options first if needed. Some that I have to use once in a while: boot nousb
- to turn off USB if not used and it causes problems boot irqpoll - if some drivers hang with irq problem messages boot nodrivers - skip automatic disk driver loading
boot: Usually just press enter here. If you have linux knowledge, you can tweak kernel options if you need/like.
Then it boots and outputs a lot of kernel messages about your hardware and such.. most if not all are nothing to worry about.
Loading vmlinuz.................. Loading scsi.cgz.........................
Loading initrd.cgz.......... Ready. Linux version 2.6.22.6 (root@athene) (gcc version 4.1.1 20060724 (prerelease) (4.1.1-3mdk))
#2 Sun Sep 9 16:59:48 CEST 2007 BIOS-provided physical RAM map: BIOS-e820: 0000000000000000 - 000000000009f800 (usable) BIOS-e820: 000000000009f800 - 00000000000a0000 (reserved) BIOS-e820: 00000000000ca000 - 00000000000cc000 (reserved) BIOS-e820: 00000000000dc000 - 0000000000100000 (reserved) BIOS-e820: 0000000000100000 - 00000000316f0000 (usable) BIOS-e820: 00000000316f0000 - 00000000316ff000 (ACPI data) BIOS-e820: 00000000316ff000 - 0000000031700000 (ACPI NVS) BIOS-e820: 0000000031700000 - 0000000031800000 (usable) BIOS-e820: 00000000fec00000 - 00000000fec10000 (reserved) BIOS-e820: 00000000fee00000 - 00000000fee01000 (reserved) BIOS-e820: 00000000fffe0000 - 0000000100000000 (reserved) 792MB LOWMEM available. Zone PFN ranges:
DMA 0 -> 4096
Normal 4096 -> 202752 early_node_map[1] active PFN ranges
...
Serial: 8250/16550 driver $Revision: 1.90 $ 4 ports, IRQ sharing enabled serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A Floppy drive(s): fd0 is 1.44M FDC 0 is a post-1991 82077 RAMDISK driver initialized: 16 RAM disks of 32000K size 1024 blocksize USB Universal Host Controller Interface driver v3.0 Initializing USB Mass Storage driver... usbcore: registered new interface driver usb-storage USB Mass Storage support registered. serio: i8042 KBD port at 0x60,0x64 irq 1 serio: i8042 AUX port at 0x60,0x64 irq 12 usbcore: registered new interface driver usbhid drivers/hid/usbhid/hid-core.c: v2.6:USB HID core driver Using IPI Shortcut mode BIOS EDD facility v0.16 2004-Jun-25, 1 devices found Freeing unused kernel memory: 144k freed Booting ntpasswd Mounting: proc sys Ramdisk setup complete, stage separation.. In stage 2 Spawning shells on console 2 - 6 Initialization complete!
** Preparing driver modules to dir /lib/modules/2.6.22.6 input: AT Translated Set 2 keyboard as /class/input/input0
Most of the generic linux boot now done, and we try to load the disk drivers. If you use the floppy version you will be asked to swap floppies at this point. Drivers are then tried based on PCI hardware indentification.
** Will now try to auto-load relevant drivers based on PCI information
---- AUTO DISK DRIVER select ---- --- PROBE FOUND THE FOLLOWING DRIVERS: ata_piix ata_generic mptspi --- TRYING TO LOAD THE DRIVERS ### Loading ata_piix scsi0 : ata_piix scsi1 : ata_piix ata1: PATA max UDMA/33 cmd 0x000101f0 ctl 0x000103f6 bmdma 0x00011050 irq 14 ata2: PATA max UDMA/33 cmd 0x00010170 ctl 0x00010376 bmdma 0x00011058 irq 15 ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 ata2.00: configured for UDMA/33 scsi 1:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 sr0: scsi3-mmc drive: 1x/1x xa/form2 cdda tray Uniform CD-ROM driver Revision: 3.20
### Loading ata_generic
### Loading mptspi Fusion MPT base driver 3.04.04 Copyright (c) 1999-2007 LSI Logic Corporation Fusion MPT SPI Host driver 3.04.04 PCI: Found IRQ 9 for device 0000:00:10.0 mptbase: Initiating ioc0 bringup ioc0: 53C1030: Capabilities={Initiator} scsi2 : ioc0: LSI53C1030, FwRev=01032920h, Ports=1, MaxQ=128, IRQ=9 scsi 2:0:0:0: Direct-Access VMware, VMware Virtual S 1.0 PQ: 0 ANSI: 2 target2:0:0: Beginning Domain Validation target2:0:0: Domain Validation skipping write tests target2:0:0: Ending Domain Validation target2:0:0: FAST-40 WIDE SCSI 80.0 MB/s ST (25 ns, offset 127) sd 2:0:0:0: [sda] 83886080 512-byte hardware sectors (42950 MB) sd 2:0:0:0: [sda] Write Protect is off sd 2:0:0:0: [sda] Cache data unavailable sd 2:0:0:0: [sda] Assuming drive cache: write through sd 2:0:0:0: [sda] 83886080 512-byte hardware sectors (42950 MB) sd 2:0:0:0: [sda] Write Protect is off sd 2:0:0:0: [sda] Cache data unavailable sd 2:0:0:0: [sda] Assuming drive cache: write through sda: sda1 sd 2:0:0:0: [sda] Attached SCSI disk
Most of these messages are from the drivers themselves. Some talk a lot, some doesn't. But all give info on the brand and model and size of the disks found, if any.
------------------------------------------------------------- Driver load done, if none loaded, you may try manual instead.
-------------------------------------------------------------
** If no disk show up, you may have to try again (d option) or manual (m).
You can later load more drivers..
************************************************************************* * Windows Registry Edit Utility Floppy / chntpw * * (c) 1997 - 2007 Petter N Hagen - pnh@pogostick.net * * GNU GPL v2 license, see files on CD * * * * This utility will enable you to change or blank the password of * * any user (incl. administrator) on an Windows NT/2k/XP/Vista * * WITHOUT knowing the old password. * * Unlocking locked/disabled accounts also supported. * * * * It also has a registry editor, and there is now support for * * adding and deleting keys and values. * * * * Tested on: NT3.51 & NT4: Workstation, Server, PDC. * * Win2k Prof & Server to SP4. Cannot change AD. * * XP Home & Prof: up to SP2 * * Win 2003 Server (cannot change AD passwords) * * Vista 32 and 64 bit * * * * HINT: If things scroll by too fast, press SHIFT-PGUP/PGDOWN ... * *************************************************************************
========================================================= There are several steps to go through:
- Disk select with optional loading of disk drivers
- PATH select, where are the Windows systems files stored
- File-select, what parts of registry we need
- Then finally the password change or registry edit itself
- If changes were made, write them back to disk
DON'T PANIC! Usually the defaults are OK, just press enter
all the way through the questions
========================================================= ¤ Step ONE: Select disk where the Windows installation is
=========================================================
Disks: Disk /dev/sda: 42.9 GB, 42949672960 bytes
Candidate Windows partitions found: 1 : /dev/sda1 40958MB BOOT
Here it has found one disk with one partition
Please select partition by number or q = quit d = automatically start disk drivers m = manually select disk drivers to load f = fetch additional drivers from floppy / usb a = show all partitions found l = show propbable Windows (NTFS) partitions only Select: [1]
Here you select one of the partitions listed above (in this case there is only one) or one of the letters from the menu.
Floppy users may need to do 'f' to load in more drivers from another floppy.
The 'd' option will re-run the PCI scan and start relevant drivers (they must already be loaded from floppy with 'f' option)
The 'm' for manual load will present a list of all the drivers with short description if available, and allow you to specify which to load. (Dependecies are handled automatically)
Here we only have one partition, so we just press enter to select it.
Selected 1
Mounting from /dev/sda1, with filesystem type NTFS
NTFS volume version 3.1.
It was an NTFS filesystem, and it mounted successfully.
========================================================= ¤ Step TWO: Select PATH and registry files
========================================================= What is the path to the registry directory? (relative to windows disk) [WINDOWS/system32/config] :
The registry is usually system32/config under WINDOWS or WINNT directory, depending on the windows version (and it may be changed during installation). If the correct partition has been selected, the default prompt will be adjusted to match if it can find one of the usual variants.
We accept the defaults.. and get a (bit filtered) directory listing showing most of the interesting registry files
-rw------- 2 0 0 262144 Feb 28 2007 BCD-Template
-rw------- 2 0 0 6815744 Sep 23 12:33 COMPONENTS -rw------- 1 0 0 262144 Sep 23 12:33 DEFAULT drwx------ 1 0 0 0 Nov 2 2006 Journal drwx------ 1 0 0 8192 Sep 23 12:33 RegBack
-rw------- 1 0 0 524288 Sep 23 12:33 SAM -rw------- 1 0 0 262144 Sep 23 12:33 SECURITY -rw------- 1 0 0 15728640 Sep 23 12:33 SOFTWARE -rw------- 1 0 0 9175040 Sep 23 12:33 SYSTEM drwx------ 1 0 0 4096 Nov 2 2006 TxR drwx------ 1 0 0 4096 Feb 27 2007 systemprofile
Select which part of registry to load, use predefined choices or list the files with space as delimiter 1 - Password reset [sam system security] 2 - RecoveryConsole parameters [software] q - quit - return to previous [1] :
Choice 1 is for password edit, most used. But if you wish, you can load any of the files (just enter it's name) and do manual registry edit on them.
But here, we select 1 for password edit, some files are copied around into memory and the edit application is invoked.
Selected files: sam system security Copying sam system security to /tmp
========================================================= ¤ Step THREE: Password or registry edit
========================================================= chntpw version 0.99.5 070923 (decade), (c) Petter N Hagen Hive name (from header): <\SystemRoot\System32\Config\SAM> ROOT KEY at offset: 0x001020 * Subkey indexing type is: 666c <lf> Page at 0x44000 is not 'hbin', assuming file contains garbage at end File size 524288 [80000] bytes, containing 11 pages (+ 1 headerpage) Used for data: 288/250904 blocks/bytes, unused: 15/23176 blocks/bytes.
Hive name (from header): <SYSTEM> ROOT KEY at offset: 0x001020 * Subkey indexing type is: 686c <lh> Page at 0x8b4000 is not 'hbin', assuming file contains garbage at end File size 9175040 [8c0000] bytes, containing 2117 pages (+ 1 headerpage) Used for data: 96982/6224016 blocks/bytes, unused: 4381/2830032 blocks/bytes.
Hive name (from header): <emRoot\System32\Config\SECURITY> ROOT KEY at offset: 0x001020 * Subkey indexing type is: 666c <lf> Page at 0x6000 is not 'hbin', assuming file contains garbage at end File size 262144 [40000] bytes, containing 5 pages (+ 1 headerpage) Used for data: 334/17312 blocks/bytes, unused: 7/3008 blocks/bytes.
* SAM policy limits: Failed logins before lockout is: 0 Minimum password length : 0 Password history count : 0
======== chntpw Main Interactive Menu ========
Loaded hives:
1 - Edit user data and passwords
2 - Syskey status & change
3 - RecoveryConsole settings
- - -
9 - Registry editor, now with full write support!
q - Quit (you will be asked if there is something to save)
What to do? [1] ->
This demo shows selection 1 for password edit, but you can also do other things. Note that 2, Syskey may be dangerous! AND NOT NEEDED TO RESET PASSWORDS! and does not work at all on Vista, but you get some info before you do any changes.
Selection 3, RecoveryConsole is only relevant for Win2k, XP and 2003 and you must have selected to load the SOFTWARE part of the registry (selection 2) earlier.
The manual registry editor is always available, it is not the most user-friendly thing, but anyway..
We continue our quest to change our "admin" users password..
===== chntpw Edit User Info & Passwords ====
| RID -|---------- Username ------------| Admin? |- Lock? --| | 03e8 | admin | ADMIN | | | 01f4 | Administrator | ADMIN | dis/lock | | 03ec | grumf1 | | | | 03ed | grumf2 | | | | 03ee | grumf3 | | | | 01f5 | Guest | | dis/lock | | 03ea | jalla1 | ADMIN | *BLANK* | | 03eb | jalla2 | | *BLANK* | | 03e9 | petro | ADMIN | *BLANK* |
This is a list of all local users on the machine. You may see more users here than in the overly user-friendly control panel, for example XP has some help and support built in users. The users marked "ADMIN" are members of the administrators group, which means they have admin rights, if you can login to one of them you can get control of the machine.
The buildt in (at install time in all windows versions) administrator is always RID 01f4. This example is from Vista, and Vista by default has this locked down (the installer instead asks and makes another user the regular use administrator, in this case RID 03e8)
The "lock?" collumn show if the user account is disabled or locked out (due to many logon attempts for example) or BLANK if the password seems to be blank.
We select to edit the "admin" user (this was the user made administrator by the Vista installer)
Select: ! - quit, . - list users, 0x - User with RID (hex) or simply enter the username to change: [Administrator] admin
RID : 1000 [03e8] Username: admin fullname: comment : homedir :
User is member of 1 groups: 00000220 = Administrators (which has 4 members)
Group 220 is THE BOSS GROUP! :)
Account bits: 0x0214 = [ ] Disabled | [ ] Homedir req. | [X] Passwd not req. | [ ] Temp. duplicate | [X] Normal account | [ ] NMS account | [ ] Domain trust ac | [ ] Wks trust act. | [ ] Srv trust act | [X] Pwd don't expir | [ ] Auto lockout | [ ] (unknown 0x08) | [ ] (unknown 0x10) | [ ] (unknown 0x20) | [ ] (unknown 0x40) |
Failed login count: 0, while max tries is: 0 Total login count: 3
Some status info, user is locked out if "Disabled" is set or "Failed login count" is larger than "max tries" policy setting. This user is not locked in any way. The lockout can be reset with option 4 below.
- - - - User Edit Menu: 1 - Clear (blank) user password 2 - Edit (set new) user password (careful with this on XP or Vista) 3 - Promote user (make user an administrator) (4 - Unlock and enable user account) [seems unlocked already] q - Quit editing user, back to user select Select: [q] > 1 Password cleared!
Here we just reset/clear/blank the password. But you can also try to set a new password with option 2, but it will only work if the password is not blank already. Also, it often fails to work on XP and newer systems.
Number 3 is to put a non-admin user into the administrators (220) group, thus making the user an administrator. IT IS STILL EXPERIMENTAL AND IT MAY sometimes RESULT IN STRANGE ERRORS WHEN LATER EDITING THE GROUP FROM WINDOWS! Also, usually pointless in promoting the Guest user, as it is most likely forbidden to log in by the security policy settings.
Select: ! - quit, . - list users, 0x - User with RID (hex) or simply enter the username to change: [Administrator] !
Exclamation point ! quits out (it's SHIFT 1 on the US keyboard layout used on the boot CD) Then we get back to the main menu, and select to quit..
======== chntpw Main Interactive Menu ========
Loaded hives: <sam> <system> <security>
1 - Edit user data and passwords
2 - Syskey status & change
3 - RecoveryConsole settings
- - -
9 - Registry editor, now with full write support!
q - Quit (you will be asked if there is something to save)
What to do? [1] -> q
Hives that have changed: # Name 0 - OK
========================================================= ¤ Step FOUR: Writing back changes
========================================================= About to write file(s) back! Do it? [n] : y
You must answer y, or the changes will not be saved. This is the last chance to change your mind!
Writing sam
Only changed files of the registry are actually written back.
If you forgot something, you may run again, else press CTRL-ALT-DEL to reboot.
***** EDIT COMPLETE *****
You can try again if it somehow failed, or you selected wrong New run? [n] : n
=========================================================
* end of scripts.. returning to the shell.. * Press CTRL-ALT-DEL to reboot now (remove floppy first) * or do whatever you want from the shell.. * However, if you mount something, remember to umount before reboot * You may also restart the script procedure with 'sh /scripts/main.sh'
(Please ignore the message about job control, it is not relevant)
BusyBox v1.1.0-pre1 (2005.12.30-19:45+0000) Built-in shell (ash) Enter 'help' for a list of built-in commands.
sh: can't access tty; job control turned off And I got about a gazillion questions on this error message, even if it is mentioned in the FAQ It is from the shell telling it cannot do "job control" which means it cannot handle CTRL-C etc. It HAS NOTHING TO DO WITH YOUR PASSWORD RESET DID NOT WORK! That is caused by a lot of other things.
您可以通过更改几个注册表值来获得Windows计算机的命令行访问权限(在SYSTEM上下文中)。然后,您可以重置密码,创建新帐户,运行破解工具等等。
这是简短版本,适用于高级用户和系统管理员:
1)从安装或修复DVD,Windows PE 3启动媒体或从另一个HDD上的Windows 7安装启动到Windows 7。(如果目标操作系统是Vista,请使用Vista安装DVD,Windows PE 2或其他Vista安装。如果目标操作系统是Windows XP,请使用Windows PE或其他Windows XP安装。)
2)从目标OS加载SYSTEM注册表配置单元。首先备份。
3)在“安装程序”项中,将SetupType更改为2,将CmdLine更改为cmd.exe。
4)引导目标操作系统。您将在系统上下文中获得一个命令行窗口。
这里有更多详细信息,包括非专家使用此技术重置密码的说明。(请记住,重置密码将导致所有加密的文件和数据丢失。)
您可以使用另一个名为Hiren's BootCD的工具来重置密码。
从此处下载Hiren's Boot ,解压缩并使用BurnCDCC.exe将ISO刻录到DVD。
使用锁定的PC上的Hiren's Boot进行引导,并在显示的菜单中选择Offline NT / 2000 / XP / Vista / 7 Password Changer,然后单击Enter两次(进行确认,并继续查看Linux Kernel Boot列表)。
在以下提示中,选择安装Windows的正确驱动器。按Enter确认您的注册表目录为Windows/system32/config
。
在chntpw主交互式菜单上,选择[1]以编辑用户数据和密码。
通过输入用户名并按Enter键,选择要重置密码的用户。
那里有此用户的选项列表。[1]应为清除密码。成功重置忘记的Windows密码后,键入“!”以关闭用户编辑器工具。
现在键入“ q”,然后按Enter键以关闭“脱机密码编辑器和注册表”工具。
现在键入“ y”,然后按Enter确认密码更改。
现在它将询问您是否要再次使用它。只需键入“ n”,然后按Enter。
取出CD并重新启动PC,您的用户将不再具有密码。
希望这对您有帮助。
Windows Boot Genius-在Windows 8.1、8、7,Vista,XP中恢复丢失的Windows本地管理员/用户密码。
密码恢复包 -如果您忘记了Windows密码而无法登录计算机,则可以在任何Windows 8、7、2008,Vista,XP,2003、2000系统上即时绕过,解锁或重置丢失的管理员密码和其他帐户密码。它还可以为Windows 2012/2008/2003/2000 Active Directory服务器重置Windows域管理员/用户密码。
Renee Passnow-使用独立于Windows系统的PassNow:重置登录密码,克隆硬盘,创建磁盘分区或格式化磁盘,擦除数据并解决系统启动问题。
添加一个答案以涵盖对我有用的方法(此处其他答案尚未完全涵盖)。这适用于Windows 7,更高版本的Windows已关闭此漏洞利用。
我尝试了其他答案中列出的其他步骤,但没有成功。对我有用的是将cmd.exe hack / trick替换为sethc.exe(粘性密钥)。但是我必须通过使用Notepad.exe来执行此操作,该文件在系统恢复后运行以查看日志文件。在安装驱动器的情况下以管理员身份进入命令行的其他技术无效,因此我不得不使用此记事本技巧。
程序:
关闭并重新启动。当看到Windows启动时,按住电源按钮并关闭电源。
打开。Windows启动应报告上一次Windows启动失败,因此它将提供“启动启动修复”选项。选择此选项。
取消启动修复。取消系统还原。
报告对话框将显示无法完成报告修复。在其中展开“查看问题详细信息”。在问题详细信息下,显示了指向x:/ windows / ...日志文件的链接。点击这个。
Notepad.exe打开,显示日志文件。该记事本以管理员身份运行,并且挂载的文件系统x:是您的硬盘。
5.1记事本:文件-打开-浏览到X:/ Windows / system32-滚动到sethc.exe
5.2右键单击sethc.exe,然后重命名为sethc-BACKUP.exe
5.3滚动到cmd.exe。右键单击cmd.exe。复制。右键点击。糊。
5.4。当我粘贴cmd.exe时,以管理员身份运行了命令行,因此我在命令行上执行了“ cd x:/ Windows / system32”,然后“复制了cmd.exe sethc.exe”。
5.4-1如果您不喜欢使用命令行,则只需使用记事本文件打开浏览器,然后复制cmd.exe并将其重命名为sethc.exe。
重新启动,没有任何有趣的东西。
在登录页面上,按Shift键5次或更多次触发粘滞键。将显示命令行对话框,而不是粘滞键。以管理员身份运行。“网络用户管理员*”设置密码。
此处提供了有关该过程的屏幕截图的完整说明:http : //null-byte.wonderhowto.com/how-to/hack-windows-7-become-admin-0160151/
背景:所有者不知道笔记本电脑的管理员密码。他们有一个具有admin privs的用户帐户,因此没有必要。直到Windows登录页面停止显示其用户!我们猜测用户个人资料已损坏或有不良情况。
在尝试使用记事本+粘滞键替换hack之前,我尝试了一系列过程。为了记录在案,它们是(以及我遇到的问题):
密码错误后尝试以管理员身份登录时,系统会提示您插入应急磁盘(以重置密码)。我们在CD上有Windows 7应急磁盘。但是提示要求使用软盘或USB。我没有方便的USB记忆棒,而且懒得去购物和创建USB引导盘一团糟。
使用系统修复磁盘进入命令行不允许使用cmd.exe技巧/ hack替换sethc.exe。或者允许重设管理员密码“ net use Administrator *”。命令行以admin的身份运行,而不是以计算机上的实际admin身份运行,更多的是系统修复admin和磁盘似乎没有完全访问权限安装。。。〜不确定〜
使用linux系统急救cd(https://www.system-rescue-cd.org(版本4.8.2))我无法挂载驱动器。我会看到这是一个GPT分区驱动器-ntfs-3g gparted sfdisk工具应该可以与GPT一起使用,但不能。这台计算机在Windows启动之前提示输入用户名+域+密码,因此不确定,但是也许有一些额外的安全性(安装驱动器需要此安全性吗?)
最终DID的工作是遵循最终视图日志文件(在记事本中打开)上的系统恢复顺序(无需外部/附加cd)。然后打开文件-浏览到cmd.exe-复制-粘贴-覆盖sethc.exe。然后重新启动-触发粘滞键-使用命令行“网络用户管理员*”设置密码。
总之,此解决方案不需要您有任何额外的启动或修复CD。它非常便携:-)非常简单。因此,作为第一种密码恢复方法可能值得尝试。
对于某些人来说,这里的一些答案非常复杂。我知道的最简单的方法是使用Windows密码救援程序。
如何使用解释都在这里:http : //www.daossoft.com/documents/how-to-use-windows-password-rescuer-personal.html
编辑:正如评论中建议的,这里是您所需要的。
另一台电脑
Windows密码救援软件
USB磁盘或CD / DVD
脚步:
现在登录您的帐户应该没有问题。
另一个提示。对于Windows 8和Windows 10,首选的登录方法是使用Microsoft帐户。因此,您可以重置密码并使用新密码登录。
Microsoft帐户密码重置页面:https : //account.live.com/password/reset
对于本地Windows帐户,您可以按照本教程重设密码。
重置管理员密码Windows 8.1,2016年11月
我希望回答这个问题,因为它是关于Windows 8.1而不是Windows 7,但已被不明智地关闭。
为了避免任何误解:我需要恢复Win 8.1 admin-pw。
如果您尝试使用以下答案:https : //superuser.com/a/952224/82741及其选项1,您将发现该技巧不再起作用。
最后一步,当@ td512建议使用时net user ...
,在我的情况下不起作用。相反,我发现可以从Windows使用GUI来更改PW:type control userpasswords2
,而不是来显示它net user ...
。
我过去曾遇到此问题,但我找到了一种破解密码的方法。您只需下载此密码并阅读README.txt文件,您将获得所有简单的步骤即可使用它来破解密码。我仍然在为您写一个步骤:
脚步:
步骤1:从此处下载文件
步骤2:将所有下载的文件复制到可移动磁盘(笔驱动器)中
步骤3:打开命令提示符,输入以下行:h:\ syslinux.exe -ma h:(用可移动驱动器(如i,j,G)替换“ h”)
步骤4:将笔式驱动器插入目标PC并启动该笔式驱动器(传统必须为ON)。
第5步:在所有步骤中都按Enter键,直到获得诸如清除密码之类的说明。
第6步:获得此步骤后,请清除密码。完成此步骤并重新启动系统,现在它不会要求输入密码,计算机将启动。