![]() Ophcrack does a fine job cracking Windows password hashes using so-called rainbow tables. Basically, Windows stores your user password in a hash, a seemingly arbitrary series of numbers and letters. Although this is very useful, it leaves traces my client has to reset his or her password and actual changes are made to the Windows setup. ![]() ntpasswd allows a user to reset the password of a user account by booting from a special boot disk. While they do their job brilliantly and have both saved me on numerous occasions, they have drawbacks. But for multiple reasons, those tools just don’t seem to cut it for me. Now of course I could use fairly established tools such as Offline Windows Password & Registry Editor (also known as ntpasswd for you geeks out there) or Ophcrack. ![]() Now for me, repairs would usually pause here while I’m waiting for the moment I can get a hold of my client and ask him or her for the correct password. Okay, first obstacle logging into the client’s user account. So, let’s boot this thing and see what’s wrong with it this time. Another computer from another (self-proclaimed) client for you to fix.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |