You Might have read my previous posts about how to remove windows passwords using chntpw and might be thinking why am I writing another tutorial to do the same thing! Well today we are not going to remove the windows user password rather we are going to be more stealth in that we are not going to remove it rather we are going to know what is the users password and access his/her account with his/her own password. Sounds nice...
Requirements:
- A live bootable linux OS (I'm using Kali Linux)(Download Kali Linux)
- Mimikatz (Download | Blog)
- Physical Access to victim's machine
- A Working Brain in that Big Head (Download Here)
Steps:
1. First of all download mimikatz and put it in a pendrive.2. Boat the victim's PC with your live bootable Pendrive (Kali Linux on pendrive in my case). And open a terminal window
3. Mount the Volume/Drive on which windows 8/8.1 is installed by typing these commands
in the terminal window:
mkdir /media/win
ntfs-3g /dev/sda1 /media/win
[NOTE] ntfs-3g is used to mount an NTFS drive in Read/Write mode otherwise you might not be able to write on the drive. Also /dev/sda1 is the name of the drive on which Windows OS is installed, to list your drives you can use lsblk -l or fdisk -l. The third flag is the location where the drive will be mounted.
4. Now navigate to the System32 folder using the following command
cd /media/win/Windows/System32
5. After navigating to the System32 rename the sethc.exe file to sethc.exe.bak by typing the following command:
mv sethc.exe sethc.exe.bak
sethc.exe is a windows program which runs automatically after shift-key is pressed more than 5 times continuously.
6. Now copy the cmd.exe program to sethc.exe replacing the original sethc.exe program using this command:
cp cmd.exe sethc.exe
[Note] We made a backup of sethc.exe program so that we can restore the original sethc.exe functionality
7. With this, we are done with the hard part of the hack now lets reboot the system and boot our Victim's Windows 8/8.1 OS.
8. After reaching the Windows Login Screen plugin the usb device with mimikatz on it and hit shift-key continuously five or more times. It will bring up a command prompt like this
9. Now navigate to your usb drive in my case its drive G:
10. Now navigate to the proper version of mimikatz binary folder (Win32 for32bit windows and x64 for 64 bit windows)
11. Run mimikatz and type the following commands one after the other in sequence:
privilege::debug
token::elevate
vault::list
the first command enables debug mode
the second one elevates the privilages
the last one lists the passwords which include picture password and pin (if set by the user)
That's it you got the password and everything else needed to log into the system. No more breaking and mess making its simple its easy and best of all its not Noisy lol...
Hope you enjoyed the tutorial have fun :)
More articles
- Black Hat Hacker Tools
- Hacking Tools
- Hacker Tools List
- Hacking Tools Usb
- Computer Hacker
- Hack Tools For Ubuntu
- Hacker Tools Software
- Nsa Hacker Tools
- Hacker Security Tools
- Pentest Reporting Tools
- Nsa Hack Tools Download
- Best Pentesting Tools 2018
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Online
- Pentest Tools For Windows
- Pentest Tools Review
- Computer Hacker
- Top Pentest Tools
- Pentest Tools Free
- Hacks And Tools
- Beginner Hacker Tools
- Hacker Tools Hardware
- Pentest Tools For Ubuntu
- Hacker Tools List
- Hacker Tools Hardware
- Hacker Tools For Ios
- Free Pentest Tools For Windows
- Best Hacking Tools 2020
- Nsa Hack Tools Download
- Pentest Tools Website Vulnerability
- Hacker Tools 2020
- Wifi Hacker Tools For Windows
- Pentest Tools For Mac
- Hak5 Tools
- Hacker Tools For Pc
- Hacker Tools Free Download
- Pentest Tools Android
- Hacking Tools 2020
- Pentest Reporting Tools
- Pentest Tools Windows
- Install Pentest Tools Ubuntu
- Hacker
- Hacking Tools For Windows 7
- Hacking Tools Pc
- Hackrf Tools
- Best Hacking Tools 2019
- Pentest Tools For Mac
- Hack Tools For Windows
- Hacking Tools For Beginners
- Hacking Tools Kit
- Kik Hack Tools
- Hacking Tools For Kali Linux

No comments:
Post a Comment