How secure is the Windows lock screen?

I have often heard it said that it isn't hard to get around the standard Windows lock screen with the right now-how. However, I don't have the know how, so I don't know much about it or how accurate that is. I am interested in knowing just how hard it is to get around it, as I use it quite regularly when I am away from my computer for extended periods of time. I don't expect anything like a step by step walkthrough of how to get around the password, but I want to know just how hard it is to do. If it isn't a very secure way of locking, is there a more secure way of locking my computer? Maybe I am just being paranoid or overly curious, but I would like to know.

Bypassing the Windows lock screen can be done in numerous ways. I have been able to achieve this successfully by mounting a Windows 8 ISO onto a USB flash drive, booting into it via the "Repair my PC" option and accessing the command prompt. From there, you can copy "CMD" over the StickyKeys application, and boot back into Windows. Pressing the shift key five times will give you access into the command prompt instead of the sticky keys launcher. From the command prompt, you can use commands to change the password to something such as "1234" and logging in with that. If you would like an in depth tutorial, just say the word. Due to being a new user, my posts are limited, so if you wouldn't mind pasting this into your thread so others can see, that would be helpful.

-Abhorrence

1 Like

The only way to truly lock your PC is by initiating a BIOS password, and even then I am sure there is a way around it such as a BIOS chip replacement or flash.

-Abhorrence

All of the things that you have mentioned require a reboot. In order to use the BIOS password, you need to turn off the pc, if I am not mistaken. In order to use the ISO to access to command prompt, you need to reboot. If I am not concerned about rebooting, then is there a way to keep it locked down? What I mean is that I am more concerned about someone getting in without me knowing it than about someone getting in at all. If they didn't know my password to begin with, then they can't reset my password to what I expect it to be, so there isn't much in the way of them getting in via the command prompt to change the password route (unless you can somehow get a list of old passwords or something once inside windows). So is there any way to get around it without having to reboot (I would notice if the same applications weren't open and where I put them), and without having to change the password?

@ipat8 If you read the comment, you would know that he asked me to post that here for him.

Safe enough in nearly all cases. unless they want high security information I would say no, but then things like disabled USB ports, BIOS password and all that are already in place.

If you mean Forrest Gumps stealing your PC, those people just grab a CD and install over it :)
the so called smart nephew you have just steal the case/laptop and haul the data of the drive.
If the data is on the network then I wouldn't rely on users being smart so I would have secured the data on the network better as with pass protected access to folders if it's that important along with the fact that passwords are only valid for 30 minutes or so.

Not very, windows lock screen lock is a joke. Set up a bios password.

It depends on your threat model as in who you're trying to protect from. If it's your family, a co worker, class mate, etc it's sufficient. Going slightly higher, let's say it's somone a little more tech savvy or determined then a bios password is in order.

If it's higher then that, say the police, a Federal Bureau, NSA, etc than you will need much more than a Windows and BIOS password as they are easiy circumvented. For this threat model and for Windows something such as an encrypted system drive using VeraCrypt (MAKE SURE TO USE A VERY STRONG PASSWORD) is warranted. It's still not 100% secure as it's susceptible to cold boot attacks (and a few more) if the system is locked, suspended or running (So turn off your PC when you leave it alone for extended periods)

3 Likes

If you want to "feel secure" use Full Disk Encryption and use very strong password to be very hard to someone brute force it and the HDD lock protection from the bios is joke.One time i forgot my password and i found a way to bypass it easily.But the bios lock is ok for an extra protection.

Edit:You can enable two password protection options from the bios.One to lock your HDD which is a joke and the other one is when you power up your computer it asks for a password (locks the bios before even enter it.)

Edit ninja 2.0 If an adversary have physical access to your computer you are most likely done.She/He will have as much time as She/He needs to crack it.(if you dont have any sensitive or "Classified" info or documents your computer i don't find any reason to worry that much).For a Typical user you will be fine with only FDE

If you have power off your computer hours ago or days the cold boot attack is useless right?

I personally don't think a bios password is much safer then a windows password. My resion from this is all you need to do is reset the jumper on the motherboard and it will undo the password. Whill doing other methods do take a little to get into. So the moral of the story is that nothing is fully secure there is always some way to get through, you just hope no one smart enough to do it goes after you.

Yes, because it relies on the data retained in memory since the key is stored there after decryption so since RAM is volitile it doesn't hold any data after it's lost power thus making extraction impossible

Yeah, lock screen is pretty damn insecure. Most of the "issues" are in place to keep the common person out, and many of the workarounds have been around since at least XP, which is when I personally first discovered them.

BIOs password is a pretty good idea. And so is HDD encryption. I don't set BIOs passwords, but any drive with sensitive info is behind a password and a keyfile, and can't be cracked that easily.

Bios password bypass and Konboot renders most machines totally vulnerable...

Encryption is probabally the better rote as if I were to remove the CMOS battery for long enough I could bypass the bios password.

I found it better because someone could just remove your damn drives and start stealing info like that... I find data more valuable and private than my computer. Yes, I'd be extremely pissed off if someone stole my computer, but the data that I store on it is much more important. Having it destroyed is better than having it stolen and used against me.

My two cents.

1 Like

dont trust any lock screen for protection, theres always a countless number of ways to get around them, especially if that person doesn't know about their admin account