Recovering Windows Password – Sticky Keys Technique


hackcenter
Hi hello readers here we discuss how to recover the administrator password by using the sticky keys technique .
The “sticky keys” technique for resetting the password on a Windows system is described in many places around the web, but all tend to over-
complicate the steps. I’m describing it here for my own reference, so I have a reminder of how it works.

The technique basically provides access to a command prompt from the Windows login page – the page right at the start with an icon for each user.
This page appears to run with administrator privileges, so the command prompt can be used to reset any password of any user without knowing
any further details.

The command prompt is invoked by moving cmd.exe into the place of the command that handles the “sticky keys” functionality in the login page.



The steps are:

1.Rename c:\windows\system32\sethc.exe out of the way (to sethc-bak.exe for example).
2.Copy c:\windows\system32\cmd.exe to c:\windows\system32\sethc.exe
3.Boot up the PC to the account selection screen.
4.Press the shift key five times. This will bring up a command prompt window.
5.Reset the password at the command prompt: net user your_user_name new_password.
6.Log in using the new password.
7.Remove c:\windows\system32\sethc.exe and restore the saved sethc-bak.exe

If u want to help someone to recover his password and u are not admin user than this will not work becuase for this one time access is required so for this u can use any live linux os to change the cmd to stickey key command.

             
                                              
Then you are at right place.
follow the steps and change window 7 password…..

Any Linux Distribution (Prefer Ubuntu,kali etc.) either installed in target computer or bootable pendrive
1. Start Linux on computer , If you are using bootable pendrive then read this.

2.if you are using Ubuntu then go to places and select drive in which Windows folder is stored. now You have mounted drive. type cd /mnt this will change Your directory to mounted drive directory. type ls this will print all mounted drive names.
3.Recognize name of drive in which Windows folder is store and type cd “drive name”
In ubuntu it will be like 103546421313 very long name of partition

4. Now You are in drive where Windows folder is present

Type cd /Windows/System32
5. Basically On login menu of Windows 7 Narrator.exe , Magnifier.exe, sethc.exe processes can be start.

When you press Shift key 5 times then sethc.exe executes.

6. Now you can change password by renaming either of these *.exe which runs during login menu.
rename sethc.exe or Magnifier.exe, Narrator.exe or many that runs during login menu.
type following in terminal
cp sethc.exe sethc_backup.exe del sethc.exe cp cmd.exe sethc.exe here we are taking sethc.exe as backup and then replacing it with command prompt so if you are pressing shift 5 times on login menu or while running windows 7 command prompt will appear.

We have finished our work on linux now restart your computer and boot your Windows OS

7. If u have used sethc.exe previously then at login screen menu press “SHIFT ” five times and see command prompt comes.
type following command and You have changed password
net user user_name your_new_password

Now try your new password to log into system.

It is the effective trick and the auther is not responsible for the any fault u can comment and discuss
and also mail me too.
And follow me on Google+ and also u can  become my friend on Facebook .

No comments:

Post a Comment