Good tut so i share From A site

Steps

  1. Use the Sam to Hack Windows Step 1 Version 2.jpg
    1
    Well, to do this you have to have a basic idea of how passwords are stored. First, when you type it in, it is encrypted into something long and unrecognizable. Then it is stored in a file called the SAM.
    Ad
  2. Use the Sam to Hack Windows Step 2 Version 2.jpg
    2
    Now, where can you find this SAM file? Well, to be blunt, it is here: Windows/system32/config/SAM. But, don't go for it just yet! It is locked to all accounts while Windows is running. It can also be found in the registry under HKEY_LOCAL_MACHINE -> SAM.
  3. Use the Sam to Hack Windows Step 3 Version 2.jpg
    3
    "If it is locked, how do I get it?" Well, the easiest way to do this is to get an alternate OS like Linux, and copy the file. That simple. You can also use a program called pwdump2, which will get it as well.
  4. Use the Sam to Hack Windows Step 4 Version 2.jpg
    4
    "Now I have it, but the password is encrypted!" Now you get to the fun part, cracking the password. There are numerous programs available, but one of the best ones is called Cain, and can be downloaded from www(dot)oxid(dot)it/cain(dot)html.
  5. Use the Sam to Hack Windows Step 5 Version 2.jpg
    5
    It outputs password, and you are done!
  6. Use the Sam to Hack Windows Step 6 Version 2.jpg
    6
    Also, another awesome trick is injecting passwords into the SAM.
  7. Use the Sam to Hack Windows Step 7 Version 2.jpg
    7
    The easiest way to gain access is simply to use a tool called chntpw to change a password in the SAM,(after you back it up using Linux), and then simply log in, do what you have to do, then restore it.
  8. Use the Sam to Hack Windows Step 8 Version 2.jpg

Post a Comment

  1. At Indian Cyber Army, applicants wishing to build up profession in Ethical hacking and Cyber security will motivate opportunity to take in the abilities for Describe Footprinting, Scanning, and Enumeration, Hacking Web servers and Web applications, DoS, SQL infusion, Buffer flood assaults, Cryptography, Wireless hacking, Linux Hacking, Countermeasures, Ethical hacking training on continuous tasks alongside moral hacking arrangement preparing.

    ReplyDelete

 
Top