0% found this document useful (0 votes)
18 views

How to Bypass Windows Passwords using Kali Linux

This tutorial explains how to reset or remove forgotten passwords on any Windows computer using Kali Linux and the chntpw program. It provides step-by-step instructions on creating a bootable USB drive with Kali Linux, accessing the Windows password files, and clearing the user password. The process allows users to regain access to their Windows device without knowing the original password or formatting the hard drive.

Uploaded by

marcelo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

How to Bypass Windows Passwords using Kali Linux

This tutorial explains how to reset or remove forgotten passwords on any Windows computer using Kali Linux and the chntpw program. It provides step-by-step instructions on creating a bootable USB drive with Kali Linux, accessing the Windows password files, and clearing the user password. The process allows users to regain access to their Windows device without knowing the original password or formatting the hard drive.

Uploaded by

marcelo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Get unlimited access to the best of Medium for less than $1/week.

Become a member

How to Bypass Windows Passwords using Kali


Linux
Frost · Follow
Published in System Weakness
3 min read · Oct 12

Listen Share More

In this tutorial, you’re going to learn how to reset/remove forgotten passwords on


any Windows computer.

Using this method you can unlock any Windows device without knowing the user
password and without formatting the hard disk.
To perform this experiment I will use a little program called chntpw. This chntpw
can remove the password of a user in Windows SAM files, even this program can
edit the Windows registry. The tool comes pre-installed by default in Kali Linux.
Make Bootable USB of Kali Linux
When you’re locked out of Windows, you need to use another computer to make a
Kali bootable USB. Please follow the steps listed below.

Download the ISO image of Kali Linux here. It’s free.

Next, you’ll need a program to install Kali on your USB drive and make it
bootable. I will use Rufus. Just download and install it on your local PC.

Start the Rufus utility and browse to locate your Kali Linux image.

Click Start to create a Kali Live USB drive.

After successfully creating a bootable USB, plug it into the USB port of your
Windows computer and boot from the USB.

You may have to press a special key (e.g., Esc, F2, F12, Del, etc.) during bootup to get
the computer to boot from the USB instead of the hard drive.

Remove Windows Password


Here I have entered into the Kali Linux operating system.
Click on the “File System” and open it. After opening it, select the drive of the
window machine where the windows is installed.

Open in app
After that right-click on a blank space in this location, and select open terminal
here, then go Search
to “/Windows /System32/config/” using the cd command. Now you
have reached the place where the Windows password file is kept.

List Users
Use the following command to find all existing users on the Windows machine.
chntpw -l SAM

Select the user whose password you want to remove. In my case is “Workgroup”. Just
replace the username and execute the following command.

chntpw -u Workgroup SAM

After executing the command it shows you different options. All you have to do is
proceed by selecting option 1 “Clear (blank) user password” to remove the Windows
password.

Then press “q” and “y” to save the changes.


At this point, you can reboot your computer and unplug the USB drive, you’ll see
there’s no password required to log in. I hope this will be helpful if you ever need to
reset/remove a Windows password.

Thank you!

Windows 10 Password Reset Passwords Hacking Kali Linux

Follow

Written by Frost
941 Followers · Writer for System Weakness

I love computers and technology, particularly in the areas of wireless encryption protocols, web
development, network security, and blockchain.

More from Frost and System Weakness


Frost in InfoSec Write-ups

How to Hack WiFi Passwords using Hashcat


In this guide, you will learn how to crack WiFi passwords using Hashcat. Hashcat is a powerful
password recovery tool that can help you…

5 min read · Oct 2

122 2

Mr Jokar in System Weakness


Track Anyone with just a Phone Number | OSINT Investigation
You can be an OSINT Investigator, CTF Player or simply someone who is getting spam calls.
Someone who is trying to verify the number you…

4 min read · May 14

637 2

Frost in System Weakness

Hack Android Phone Camera using CamPhish


In this tutorial, I will show you how to take cam shots from someone’s phone front camera or PC
webcam using a tool called “CamPhish”.

3 min read · Nov 10

26
Frost

Access Location, Camera & Microphone of any Device


Storm-Breaker is a powerful social engineering tool that allows hackers to access the victim’s
location, camera, and microphone. You can…

3 min read · Sep 25

142 2

See all from Frost

See all from System Weakness

Recommended from Medium


SaniaW.

2-Minutes Hacking
Hack any device in 120 seconds

4 min read · Aug 25

365 7

Frost in InfoSec Write-ups

How to Hack WiFi Passwords using Hashcat


In this guide, you will learn how to crack WiFi passwords using Hashcat. Hashcat is a powerful
password recovery tool that can help you…

5 min read · Oct 2

122 2

Lists

Our Favorite Productivity Advice


9 stories · 231 saves

Arka Ghosh

How To Start Reverse Engineering — A Guide


As the name suggests, reverse engineering is finding out how something works, bottoms-up.
Read on to learn more.

8 min read · Sep 30

126 2
CyberRaya in OSINT TEAM

Email2PhoneNumber: Obtain Phone Number via Email Address


Email2PhoneNumber is an open-source intelligence (OSINT) tool that allows you to obtain a
target’s phone number just by having his email…

2 min read · Jul 3

197 2

Toothless5143
Cyber Security Roadmap For Dummies
As a self-taught Ethical Hacker with a profound passion for cybersecurity, I am pleased to offer
a comprehensive roadmap based on my…

13 min read · Jul 27

116

Vengeance

Evil Twin Attack: Steal Wi-Fi Password


Cracking wifi password through a dictionary attack can only be successful if the password is
listed in the wordlist that you are using…

4 min read · Jul 5

358 1

See more recommendations

You might also like