~~NOCACHE~~ [This page last changed ~~LASTMOD~~;
visits {{counter|today| time| times}} today, {{counter|yesterday| time| times}} yesterday, and {{counter|total| time total| total times}}]
The information on this page is publicly available, much of it came from ChatGPT and Claude.ai. It is your responsibility to use this information appropriately.
====== Regaining Access to a Windows Computer Without a Known Password ======
If you have the *legal right* to access a Windows computer but don’t know the password, here are safe and effective ways to regain access.
===== 1. Use a Password Reset Disk (if available) =====
* Boot to Windows login screen.
* Insert the password reset disk.
* Click **"Reset Password"** and follow the wizard.
> Note: Only works if the disk was created beforehand.
===== 2. Use Safe Mode with Built-in Administrator (Windows 7 or earlier) =====
* Reboot and press **F8** to access **Advanced Boot Options**.
* Select **Safe Mode**.
* Log in as the built-in **Administrator** account (if enabled and no password).
* Change the user's password via **Control Panel → User Accounts**.
> Note: The Administrator account is disabled by default in Windows 10/11.
===== 3. Use Bootable Utilities =====
==== Offline NT Password & Registry Editor ====
* Free and open-source (text-based).
* Download: https://pogostick.net/~pnh/ntpasswd/
* Burn the ISO to a USB using **Rufus** or similar.
* Boot the target machine from the USB.
* Follow on-screen instructions to clear or reset the local account password.
==== Hiren’s BootCD PE ====
* GUI-based rescue environment.
* Download: https://www.hirensbootcd.org/
* Burn ISO to USB (e.g. with **Rufus**).
* Boot from the USB drive.
* Use **NTPWEdit** or **Lazesoft Password Recovery** to blank or change a local password.
===== 4. Use Command Prompt via Recovery Console (Local Accounts) =====
* Boot into **Windows Recovery Environment** (Shift + Restart or via installation USB).
* Open **Command Prompt**.
* Replace ''Utilman.exe'' with ''cmd.exe'':
move c:\windows\system32\utilman.exe c:\windows\system32\utilman.bak
copy c:\windows\system32\cmd.exe c:\windows\system32\utilman.exe
* Reboot the machine.
* On the login screen, click the **Ease of Access** button to open a command prompt.
* Reset the password:
net user newpassword
* Restore the original `utilman.exe` file:
copy c:\windows\system32\utilman.bak c:\windows\system32\utilman.exe
===== 5. Reset Microsoft Account Password (Online Accounts) =====
* Go to: https://account.live.com/password/reset
* Follow the steps to reset the password via email, phone, or authenticator.
===== 6. Third-Party Tools (GUI-Based) =====
* **Lazesoft Recovery Suite Home** (Free): https://www.lazesoft.com/
* **PassFab 4WinKey** (Commercial): https://www.passfab.com/
* **iSunshare Windows Password Genius** (Commercial): https://www.isunshare.com/
====== Bypassing Windows Login with osk.exe ======
This page explains a legacy method for bypassing the Windows login screen using the `osk.exe` accessibility feature. Note: This method is largely blocked on modern systems and should only be used with proper authorization.
===== What is osk.exe? =====
`osk.exe` is the **On-Screen Keyboard** executable in Windows. It is part of the **Ease of Access** tools that are available even on the login screen, intended to help users with physical limitations.
===== How the Exploit Works (In Theory) =====
The idea behind the exploit is to replace `osk.exe` with `cmd.exe` so that launching the On-Screen Keyboard at the login screen actually opens a command prompt with **SYSTEM-level privileges**. From there, one can reset a password or create a new administrative account.
==== Steps (assuming admin or physical access): ====
- Boot into Windows Recovery Environment (WinRE) or from a Windows installation USB/DVD.
- Open a command prompt from the recovery options.
- Rename the original ''osk.exe'':\\ ''move C:\Windows\System32\osk.exe C:\Windows\System32\osk_backup.exe''
- Replace it with ''cmd.exe'':\\ ''copy C:\Windows\System32\cmd.exe C:\Windows\System32\osk.exe''
- Reboot the machine.
- At the login screen, click the On-Screen Keyboard icon.
- A command prompt opens instead.
- Reset the password or create a new user:
* For example, to reset a password:\\ ''net user [username] [newpassword]''
* Or to create a new admin user:\\ ''net user newuser newpassword /add''\\ ''net localgroup administrators newuser /add''
===== Limitations and Warnings =====
* Most **modern Windows systems block this method** using security features like Windows Defender, Secure Boot, and Trusted Platform Module (TPM).
* This method **does not work if BitLocker is enabled** and the drive is locked.
* It may trigger **security alerts or logs**, especially on domain-joined machines.
* **Using this method without permission is illegal**.
* For legitimate recovery, use tools such as:
* Offline NT Password & Registry Editor
* Microsoft Account password recovery tools
===== Bottom Line =====
The `osk.exe` method is a creative example of leveraging accessibility features for privilege escalation, but it is mostly ineffective on secure, up-to-date systems. It's useful from a **security awareness or forensic analysis** perspective, but not recommended for practical use today.
----
**Note:** Use these techniques only on machines you own or are authorized to service.
===== Notes and Cautions =====
* Use these methods only if you are *legally authorized* to access the system.
* These approaches will not help if the system drive is encrypted with **BitLocker** and you don’t have the recovery key.
* Antivirus software may flag some password reset tools.