Hello,
Now I know the internet is feisty about things like this, however I shall try my luck anyway. Is there a way to recover a Windows 7 password? Resetting it is not an option, since the computer in question is not mine. Looked around online, only found ways to reset it. I'm a Linux user, which explains why this is so difficult for me.
Thanks in advance.
If you know what reascataux is, you can try with that
And if I don't?
yes, and quite easy, IF you have a bootable linux USB. You need only rename a few files. I forget which ones, though; lemme look it up.
edit
Boot up with your Linux USB and mount your windows hard drive. In the System32 directory, do:
1) rename sethc.exe
to sethc.bak
.
This is the Windows "sticky keys" and accessibility software. We're just backing it up, so it is not lost in the next step.
2) rename cmd.exe
to sethc.exe
.
"Stick Keys" is accessible from the login screen. Now, the windows command line is accessible instead.
3) restart the computer normally. When you get to the login screen, press the [Shift] key repeatedly. After ~5 times, a command line window will pop up.
4) select a new password for the account you're locked out of. e.g., if my account was "traq2", I'd type: net user traq2 *
and press [Enter]. Then type a new password (you won't see it on the screen), press [Enter], and type it again to confirm.
5) close the command line window and log in with your new password.
edit 2
Also found instructions that don't require booting linux. Never tried these, though.
Im not sure about this but certainly in XP it was possible to create a new admin in safe mode and use it to remove the password of an existing admin, you can then sign out and sign into the previously locked account without a password.
To recover the passwords, not just wipe them you have to brute force them.
The best way to do this is through the use of NTLM
rainbow-tables and a tool to utilize them (like Ophcrack).
project-rainbowcrack.com/table.htm
ophcrack.sourceforge.net/
Install Ophcrack to a USB (it's a live OS), download the rainbow-tables to a drive (other than the windows installation, can be external), boot the OS and start cracking!
To clarify, at the end of this procedure (if successful - probable) you will get the user's password
No need to crack or reset the password just do this....
Boot up with your Linux USB and mount your windows hard drive. In the System32 directory, do:
1) rename "utilman.exe" to "utilman.exe.bak".
2) copy "cmd.exe" to "utilman.exe".
3) restart the computer normally. When you get to the login screen, press the ease of access button.
4) type "explorer.exe" in the command prompt window.
edit make sure to undo the changes to system32 when you're done.
Ophcrack
EDIT: Imma erase what I said, due to reasons......
The nice thing about Kon-Boot is the fact that it only flags the kernel to ignore the password hash on startup, meaning he can change his password once he's logged in. I recommended Ophcrack incase OP needed to know what the password was incase they use it for other things.
you can hack your password.
i like using this one
reset the password to nothing and BHAM! you're in like skin
The only problem is OP stated reset is not an option in the title of the topic.
The only problem with ophcrack is it hits grey-black areas as you are brute forcing into someone else machine. To know a clients password without their consent is a no-no. A plus is it is time consuming, he is better off asking for the password or not fixing it.
EDIT: Edited out the software as it is just as bad as brute forcing.
EDIT2: @dw105 Some context into what you are doing please?