Table of Contents

[This page last changed 2025.08.02 15:38; visits 3 times today, 29 times yesterday, and 89 total times]

The information on this page is publicly available, much of it came from ChatGPT and Claude.ai.  It is your responsibility to use this information appropriately.

Regaining Access to a Windows Computer Without a Known Password

If you have the *legal right* to access a Windows computer but don’t know the password, here are safe and effective ways to regain access.

1. Use a Password Reset Disk (if available)

Note: Only works if the disk was created beforehand.

2. Use Safe Mode with Built-in Administrator (Windows 7 or earlier)

Note: The Administrator account is disabled by default in Windows 10/11.

3. Use Bootable Utilities

Offline NT Password & Registry Editor

Hiren’s BootCD PE

4. Use Command Prompt via Recovery Console (Local Accounts)

move c:\windows\system32\utilman.exe c:\windows\system32\utilman.bak
copy c:\windows\system32\cmd.exe c:\windows\system32\utilman.exe
net user <username> newpassword
copy c:\windows\system32\utilman.bak c:\windows\system32\utilman.exe

5. Reset Microsoft Account Password (Online Accounts)

6. Third-Party Tools (GUI-Based)

Bypassing Windows Login with osk.exe

This page explains a legacy method for bypassing the Windows login screen using the `osk.exe` accessibility feature. Note: This method is largely blocked on modern systems and should only be used with proper authorization.

What is osk.exe?

`osk.exe` is the On-Screen Keyboard executable in Windows. It is part of the Ease of Access tools that are available even on the login screen, intended to help users with physical limitations.

How the Exploit Works (In Theory)

The idea behind the exploit is to replace `osk.exe` with `cmd.exe` so that launching the On-Screen Keyboard at the login screen actually opens a command prompt with SYSTEM-level privileges. From there, one can reset a password or create a new administrative account.

Steps (assuming admin or physical access):

  1. Boot into Windows Recovery Environment (WinRE) or from a Windows installation USB/DVD.
  2. Open a command prompt from the recovery options.
  3. Rename the original osk.exe:
    move C:\Windows\System32\osk.exe C:\Windows\System32\osk_backup.exe
  4. Replace it with cmd.exe:
    copy C:\Windows\System32\cmd.exe C:\Windows\System32\osk.exe
  5. Reboot the machine.
  6. At the login screen, click the On-Screen Keyboard icon.
  7. A command prompt opens instead.
  8. Reset the password or create a new user:
    • For example, to reset a password:
      net user [username] [newpassword]
    • Or to create a new admin user:
      net user newuser newpassword /add
      net localgroup administrators newuser /add

Limitations and Warnings

Bottom Line

The `osk.exe` method is a creative example of leveraging accessibility features for privilege escalation, but it is mostly ineffective on secure, up-to-date systems. It's useful from a security awareness or forensic analysis perspective, but not recommended for practical use today.


Note: Use these techniques only on machines you own or are authorized to service.

Notes and Cautions