Welcome to HBH! If you had an account on hellboundhacker.org you will need to reset your password using the Lost Password system before you will be able to login.

hacking vista admin account


ghost's Avatar
0 0

im attempting to hack a vista basics admin account, i only have access to a limited account. yes i have tried stuff like ophcrack (doest work with system) and offlin NT password & registry editor (fails to load SAM hive). yes i did all the cmd tricks with 'net user administrator password. yes i have tried doing the change normally. safe mode requires you to login as an admin first and i dont have the vista installation disk. someone asked me to hack this computer for them cuz the ppl who had it b4 wont tell her the password. it prompts me for admin password every time i try to do anything that requires administrative running. yes i tried desktop tools like cain and windows password recovery. I tried changing the registry, access denied. I even made some of my own ideas but still to no avail, can anyone help?


ghost's Avatar
0 0

Do you care if you just reset the password as opposed to cracking it? If not http://trinityhome.org/

Though this only work for local logins not domains.


GTADarkDude's Avatar
Member
0 0

Can you get in the system's BIOS setup? Make sure USB/CD is above your HDD in your boot order. (This usually is the default case, so if BIOS setup is blocked by a password, you can still try this.) Then use a Linux Live USB/CD.


ghost's Avatar
0 0

site of no help. and i dont have a password reset disk and cant make one without admin access.


ghost's Avatar
0 0

most of the password recovery disks arent working. either not working with system at all or failure to load SAM


KvK's Avatar

KvK

Member
0 0

In case you were unaware, when cracking Vista passwords using Ophcrack, you must download Vista specific precomputed hash tables.

http://ophcrack.sourceforge.net/tables.php (Scroll down for Vista tables.)


hellboundhackersok's Avatar
Banned
0 0
  1. Boot into Linux LiveCD
  2. Copy over SAM hashes to USB
  3. Crack using Ophcrack.

Worked at my school :p


ghost's Avatar
0 0

In your school do you choose passwords or are you given them? Also is it the standard log in or do they have an extra security feature? And you do have the tables KvK explained?

You can also reset the password, I suggest: http://pogostick.net/~pnh/ntpasswd/


ghost's Avatar
0 0

yes i have the table for ophcrack. and it just wont load on the system. and yes i have ntpasswd too, it has a problem loading the SAM files. but i will try copying the SAM to usb. do you know the location of the SAM files? oh and im not doing this to a school computer, I am hacking it FOR the police, its security is very tight.


ghost's Avatar
0 0

i dont think this will be any help, but on XP i used SAMinside and got the hashed password and just cracked it that way, as i said i don't know if it will help at all due to the fact i was cracking a XP password and i don't know if it will work for vista, or a vista limited access account, worth a try though.


hellboundhackersok's Avatar
Banned
0 0

cruizrisner wrote: yes i have the table for ophcrack. and it just wont load on the system. and yes i have ntpasswd too, it has a problem loading the SAM files. but i will try copying the SAM to usb. do you know the location of the SAM files? oh and im not doing this to a school computer, I am hacking it FOR the police, its security is very tight.

copy everything from: C:\Windows\System32\config\SAM

to the USB, then in ophcrack select them.

Oh! And you can't copy them if you're IN windows, you have to boot linux from a USB, CD, or DVD.


ghost's Avatar
0 0

well yea i know that. nevermind now i got it now. solution: boot into a Ubuntu LiveCD and replace C:\Windows\System32\sethc.exe by C:\Windows\System32\cmd.exe (don't forget to make a backup of sethc.exe to restore it later) After that you can boot back into windows and press shift 5 times at the login screen. You will get a shell with system right. You can try to do you net user tricks there.


korg's Avatar
Admin from hell
0 0

Booting windows with a live linux cd is the oldest trick to remove passwords or recover data, It was suggested to you a few times in this thread, So it's nothing new. By the way the trinity rescue disk works great on vista, If you know how to use it.


ghost's Avatar
0 0

well i didnt know the sethc.exe and the five shifts trick


ghost's Avatar
0 0

what is isethc.exe?


ghost's Avatar
0 0

cruizrisner,you mean rename the cmd.exe to sethc.exe and delte the original sethc.exe?as both are in the same directory


stealth-'s Avatar
Ninja Extreme
0 0

silvercats wrote: cruizrisner,you mean rename the cmd.exe to sethc.exe and delte the original sethc.exe?as both are in the same directory

Okay, this is the second thread in less than a day you have unnecessarily necro'd. This thread is 4 months old, and your bringing it back up to ask a really dumb question. Googling this would probably answer the question right away, if it isn't obvious from common sense.

Please think about stuff before you do it. Seriously, apparently it can really be beneficial.

But, yes, the idea is that you should move sethc.exe to another filename (ex: sethc.exe.old) and copy cmd.exe to a new name of sethc.exe. Then, once booted up, pressing shift 5 times in a row activates the sticky keys configuration window, which is sethc.exe. Since sethc.exe is actually a command binary (cmd.exe), a command shell gets executed, instead of the configuration window. Then you can move sethc.exe.old back to sethc.exe to replace sticky-keys functionality.


ghost's Avatar
0 0

thanks stealth ,:p sorry for asking a dumb question :)