{"id":772,"date":"2017-01-06T07:22:01","date_gmt":"2017-01-06T06:22:01","guid":{"rendered":"https:\/\/www.em-soft.si\/myblog\/elvis\/?p=772"},"modified":"2017-01-06T07:22:01","modified_gmt":"2017-01-06T06:22:01","slug":"have-your-forgotten-your-local-administrator-password","status":"publish","type":"post","link":"https:\/\/em-soft.si\/myblog\/elvis\/?p=772","title":{"rendered":"Have your forgotten your Local Administrator password?"},"content":{"rendered":"<p>Well, if the computer is yours and you have physical access to it, than you can solve it.<br \/>\nThis procedure will work with Windows 8.x and newer and Windows server 2012 and newer. It is not a real hacking technology, but we will use a hole of the operating system.<br \/>\nAll we need in this case is to open a shell with enough high privileges before we are asked for the password. Impossible? Not really.<br \/>\nWe will do it in a simple way:<\/p>\n<ul>\n<li>Insert installation media to your computer and start it from installation media<\/li>\n<li>In installation process select Repair your computer<\/li>\n<\/ul>\n<p><a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=776\" rel=\"attachment wp-att-776\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-776\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password1-300x226.png\" alt=\"\" width=\"300\" height=\"226\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password1-300x226.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password1.png 626w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>In Choose your option select Troubleshoot and then Command prompt<\/li>\n<\/ul>\n<p><a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=777\" rel=\"attachment wp-att-777\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-777\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password2-300x204.png\" alt=\"\" width=\"300\" height=\"204\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password2-300x204.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password2.png 656w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Find the partition where Windows are installed (default is C:) and change directory to <em>Windows\\System32 <\/em>(<em><strong>cd \\\\Windows\\\\System32<\/strong><\/em>)<\/li>\n<li>For server systems you have to rename file \u201c<em>UserInit.exe<\/em>\u201d to something else, using command <strong><em>Ren UserInit.exe Userinit.Old<\/em> <\/strong>and replace the missing file with cmd by copying a file with command <em><strong>copy cmd.exe userinit.exe<\/strong><\/em><\/li>\n<li>For windows systems you have to rename the file \u201c<em>Utilman.exe<\/em>\u201d to something else, using the command <em><strong>Ren Utilman.exe Utilman.Old<\/strong> <\/em>and replace the missing file with cmd by copying a file with command <em><strong>copy cmd.exe Utilman.exe<\/strong><\/em><\/li>\n<\/ul>\n<p><a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=778\" rel=\"attachment wp-att-778\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-778\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password3-300x229.png\" alt=\"\" width=\"300\" height=\"229\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password3-300x229.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password3.png 682w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Restart the computer to boot into normal operating system (where you forgot the password)<\/li>\n<li>Click on Easy of Access icon and a Command prompt window will open. To clarify, this Command shell is opened as system, so you can do a lot of things here.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=774\" rel=\"attachment wp-att-774\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-774\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password4.png\" alt=\"\" width=\"242\" height=\"185\" \/><\/a><\/p>\n<ul>\n<li>If Administrator account is disabled (Windows 8.x or 10), first you need to enable it with command <em><strong>Net user Administrator \/enable:yes<\/strong><\/em><\/li>\n<li>Reset password of Administrator account with command <em><strong>Net user Administrator MyPassword<\/strong><\/em>, where <em><strong>MyPassword<\/strong><\/em> is your new password<\/li>\n<\/ul>\n<p><a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=775\" rel=\"attachment wp-att-775\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-775\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password5-300x156.png\" alt=\"\" width=\"300\" height=\"156\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password5-300x156.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2017\/01\/Password5.png 645w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Close command prompt and login to your System.<\/li>\n<\/ul>\n<p>Do not use this procedure for hacking. This article is meant for recovering your passwords and passwords for your clients and will not recover domain passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Well, if the computer is yours and you have physical access to it, than you can solve it. This procedure will work with Windows 8.x and newer and Windows server 2012 and newer. It is not a real hacking technology, but we will use a hole of the operating system. All we need in this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,13,15],"tags":[39,34,28,40],"class_list":["post-772","post","type-post","status-publish","format-standard","hentry","category-uncategorized","category-windows","category-windows-server","tag-windows","tag-windows-10","tag-windows-8","tag-windows-server"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/posts\/772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=772"}],"version-history":[{"count":2,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/posts\/772\/revisions"}],"predecessor-version":[{"id":779,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/posts\/772\/revisions\/779"}],"wp:attachment":[{"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}