- Products ▼
- For Windows
- Android Manager for Win
- Android Data Recovery
- Phone Transfer for Win
- Android Root Pro
- For Mac
- Android Manager for Mac
- Android Data Recovery Mac
- Phone Transfer for Mac
- More >>>
But this will help you overcome the problem of all such type of user who forget their password. Now I am going to show you how you can do it. This is welcome screen of windows7 which is password protected now I am going to show you how to break the Administrator password. Now what you can do, first you can restart your windows.
Home > Resources > Best Windows 10 Administrator Password Reset Tool
(0 comments)
If you ever forgot Windows 10 user or admin password in the past, you knew very well how frustrating it could be. You sit down at your desktop, boot it up, and then at the login screen you suddenly realise that you have no clue what the password is. If you've ever found yourself in this type of situation, you may have even panicked and wondered whether you have to go through the painful experience of reinstalling Windows 10 OS. Thankfully, that is not required at all in nowadays. With the several useful suggestions listed below, you can easily bypass protection from a locked PC and it is no longer a problem.
In this article, we will briefly discuss five different methods to reset Windows password. Each method has it own advantages and limitations so make your own decision based on the situation you are already in. According to our test, Method 2 is the fastest solution (less than 5 minutes) to successfully reset Windows 10 password for local account. Please be noted! The most complicated and time consuming solution is Hast Suite.
![Software Software](/uploads/1/2/5/8/125859468/243069197.jpg)
No.1: Reset Windows 10 Administrator Password with Reset Disk
There are a few users with good luck by making a password reset disk in advance. They might expect such an awful thing happening in future. It is a wise move. So basicially, you need to create this reset disk while you still have access to your Windows 10 user account:
Step 1: On the Windows 10 login screen, click 'Reset Password'.
Step 2: Now insert the pre-created password reset disk into that computer. From that drop-down menu, select the drive name of password reset disk and click 'Next'.
Step 3 : Once the computer recognize and scan the disk successfully, you will be prompted with the following screen to set a new password for login.
You can now get access to the computer with the new password. However, if you forgot making a reset disk as we mentioned above, then no worries. Please read the suggestions below.
No.2: How to Reset Windows 10 Password in Minutes
If you neither create a password reset disk, nor sign in with Microsoft account, then the only way left is by using password recovery software. Androidphonesoft Windows Password Recovery is a powerful software utility that can reset any Windows password from Windows XP and Vista all the way up to Windows 10. The software is very simple to use, and all you will need is a second PC and either a USB flash drive or a blank writable DVD or CD.
Step 1 Download and Install Windows Password Recovery Tool
On the second PC, make sure you have admin rights. You can now download and install the program. You can see the main UI as this:
Step 2 Make a Windows 10 Password Reset Disk
Launch the software application and insert the removable drive into that PC. On the software interface, you will see two options for burning the ISO file. One is for creating the bootable media on a USB drive, and the other one is for creating it on a DVD or CD. Select the appropriate option and click the 'Burn' button against that.
Step 3 Boot Locked Windows 10 PC
Now that your password reset disk is ready, remove it from second PC and insert it into the locked one. Boot up the locked PC as you normally would, but during the boot process press the special key that will take you to the boot menu. This is usually F2 or Esc or Del key, but the key to be pressed will be displayed during boot-up. Once you are inside the boot menu, change the boot order to boot from the disk, and continue the boot process.
Step 4 Reset Windows 10 Admin Password
Once you see the software interface on your locked PC, simply select your Windows version, the user account for which the password has been forgotten or lost, and click on the button that says 'Reset Password'.
When the password has been reset, click on the 'Reboot' button and allow the computer to boot up normally. You should now be able to access your Windows 10 PC without any password.
No.3: Reset Forgotten Windows 10 Password without Any Software
Most of software and services owned by Microsoft can use Microsoft account for login so you don't need to create separate account for each service. With no expection, you can sign in the Windows 10 machine with your Microsoft account. If you did this and forgot the login password, then you can set a new password for login by resetting Microsoft account password.
Step 1: Since your primary PC is locked, you should borrow or use a different device to do this. It can be a computer or mobile device with Internet access. Now go to Windows Live password reset website. There, enter your Microsoft account username, and then click on the forgot password link.
Step 2: The next screen will be the Recover Account screen. A few characters will be shown, which you will need to type into the box provided, and then click on the 'Next' button.
Step 3: The next screen is for verification. You will need to choose how you want to receive your security code, whether by email or as a text message. If you chose the text option, you will be asked to type in the last four digits of your phone number. This will be the number that you provided when registering your Microsoft account.
Step 4: You can check your text message on your mobile phone, or use a different device to access your email to retrieve the security code. On your locked computer, enter this code and click on 'Next'. You will now be asked to reset the password. Enter a new password and then keep confirming until the password has been reset. You may now sign into your Windows PC using Microsoft account.
No.4: Cain & Abel (Reset Local Windows 10 Password for Free)
Cain & Able is another password recovery program that may not be your first choice for resetting a Windows 10 password. It works great with older versions of Windows, but with Windows 10 it's more of a fifty-fifty chance that your password can be unlocked. However, since this is an extremely popular utility, we have included it in this list. Here's how to use Cain & Abel to reset your Windows 10 password.
Step 1:On a different PC, download and install Cain & Abel. Next, you will need to burn the ISO file onto a DVD or a USB flash drive.
Step 2: Now, remove the disk or drive and insert it into the locked PC. Boot it up as normal, but wait for the Cain & Abel interface to appear on your screen.
Step 3: Open the option called Boot Key and locate the drive which has the Windows installation. Next, select the account name for which you have forgotten the password, and right click on it.
Step 4: Select the option called Brute Force Attack, and then NTLM hashes.
Depending on the complexity of the password, the process may take several hours, after which you will be able to see the passwords displayed on the screen if they have been recovered. If you find the one you're looking for, use that and you will be able to access the locked account.
No.5: Hash Suite (Recover Windows Password without CD or USB)
Hash Suite is fairly popular password cracking program because of its functionality. It can not only crack Windows password but aslo for other types of files, like ZIP, RAR, Word, Excel. However, it is not that easy as the ones we mentioned above.
Step 1: Extracts the hashes from the SAM file or the Security Account Manager file. Once the extraction is done, Hash Suite will allow you to crack these hashes and recover the forgotten passwords.
Step 2: To import the hashes into Hash Suite, launch the software and click on 'Local Accounts' in the Import menu. What this does is to load all of the hashes for all of the accounts on that PC.
Step 3: Once the hashes have been loaded, Hash Suite offers the dictionary and the brute force attack methods of password recovery. Simply select the appropriate parameters on the interface, and follow the onscreen instructions to recover your passwords.
Conclusion
As you have just seen, there is more than one way to reset a Windows 10 password that has been forgotten or lost for some reason. If you have a considerable amount of technical knowledge, then you will be comfortable using applications like Cain & Able or Hash Suite. On the other hand, the average user may not be proficient in using such software.
For those of us who want to keep it simple, one of the first three methods is recommended. But if you want the easiest, quickest and most reliable way, then the second option is the one you're looking for.
Related Articles
- Windows 10 Password Crack | Remove Windows Admin Password | Change Windows Password | Bootable Windows USB | ISO to USB Tool | Create Windows Reset Disk | Burn ISO to CD | Create Windows Reset Disk | More>>>
Copyright © 2015 AndroidPhonesoft. All Rights Reserved. Android is a trademark of Google, Inc
Last week's feature explaining why passwords are under assault like never before touched a nerve with many Ars readers, and with good reason. After all, passwords are the keys that secure Web-based bank accounts, sensitive e-mail services, and virtually every other facet of our online life. Lose control of the wrong password and it may only be a matter of time until the rest of our digital assets fall, too.
Take, for example, the hundreds of millions of WiFi networks in use all over the world. If they're like the ones within range of my office, most of them are protected by the WiFi Protected Access or WiFi Protected Access 2 security protocols. In theory, these protections prevent hackers and other unauthorized people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords. I was curious how easy it would be to crack these passcodes using the advanced hardware menus and techniques that have become readily available over the past five years. What I found wasn't encouraging.
First, the good news. WPA and WPA2 use an extremely robust password-storage regimen that significantly slows the speed of automated cracking programs. By using the PBKDF2 key derivation function along with 4,096 iterations of SHA1 cryptographic hashing algorithm, attacks that took minutes to run against the recent LinkedIn and eHarmony password dumps of June would require days or even weeks or months to complete against the WiFi encryption scheme.
What's more, WPA and WPA2 passwords require a minimum of eight characters, eliminating the possibility that users will pick shorter passphrases that could be brute forced in more manageable timeframes. WPA and WPA2 also use a network's SSID as salt, ensuring that hackers can't effectively use precomputed tables to crack the code.
That's not to say wireless password cracks can't be accomplished with ease, as I learned firsthand.
I started this project by setting up two networks with hopelessly insecure passphrases. The first step was capturing what is known as the four-way handshake, which is the cryptographic process a computer uses to validate itself to a wireless access point and vice versa. This handshake takes place behind a cryptographic veil that can't be pierced. But there's nothing stopping a hacker from capturing the packets that are transmitted during the process and then seeing if a given password will complete the transaction. With less than two hours practice, I was able to do just that and crack the dummy passwords 'secretpassword' and 'tobeornottobe' I had chosen to protect my test networks.
Brother, can you spare a deauth frame?
To capture a valid handshake, a targeted network must be monitored while an authorized device is validating itself to the access point. This requirement may sound like a steep hurdle, since people often stay connected to some wireless networks around the clock. It's easy to get around, however, by transmitting what's known as a deauth frame, which is a series of deauthorization packets an AP sends to client devices prior to it rebooting or shutting down. Devices that encounter a deauth frame will promptly rejoin an affected network.
Using the Silica wireless hacking tool sold by penetration-testing software provider Immunity for $2,500 a year, I had no trouble capturing a handshake established between a Netgear WGR617 wireless router and my MacBook Pro. Indeed, using freely available programs like Aircrack-ng to send deauth frames and capture the handshake isn't difficult. The nice thing about Silica is that it allowed me to pull off the hack with a single click of my mouse. In less than 90 seconds I had possession of the handshakes for the two networks in a 'pcap' (that's short for packet capture) file. My Mac never showed any sign it had lost connectivity with the access points.
I then uploaded the pcap files to CloudCracker, a software-as-a-service website that charges $17 to check a WiFi password against about 604 million possible words. Within seconds both 'secretpassword' and 'tobeornottobe' were cracked. A special WPA mode built-in to the freely available oclHashcat Plus password cracker retrieved the passcodes with similar ease.
It was the neighborly thing to do
Cracking such passcodes I had set up in advance to be guessed was great for demonstration purposes, but it didn't provide much satisfaction. What I really wanted to know was how much luck I'd have cracking a password that was actually being used to secure one of the networks in the vicinity of my office.
So I got the permission of one of my office neighbors to crack his WiFi password. To his chagrin, it took CloudCracker just 89 minutes to crack the 10-character, all-numerical password he used, although because the passcode wasn't contained in the entry-level, 604 million-word list, I relied on a premium, 1.2 billion-word dictionary that costs $34 to use.
My fourth hack target presented itself when another one of my neighbors was selling the above-mentioned Netgear router during a recent sidewalk sale. When I plugged it in, I discovered that he had left the eight-character WiFi password intact in the firmware. Remarkably, neither CloudCracker nor 12 hours of heavy-duty crunching by Hashcat were able to crack the passphrase. The secret: a lower-case letter, followed two numbers, followed by five more lower-case letters. There was no discernible pattern to this password. It didn't spell any word either forwards or backwards. I asked the neighbor where he came up with the password. He said it was chosen years ago using an automatic generation feature offered by EarthLink, his ISP at the time. The e-mail address is long gone, the neighbor told me, but the password lives on.
No doubt, this neighbor should have changed his password long ago, but there is a lot to admire about his security hygiene nonetheless. By resisting the temptation to use a human-readable word, he evaded a fair amount of cutting-edge resources devoted to discovering his passcode. Since the code isn't likely to be included in any password cracking word lists, the only way to crack it would be to attempt every eight-character combination of letters and numbers. Such brute-force attacks are possible, but in the best of worlds they require at least six days to exhaust all the possibilities when using Amazon's EC2 cloud computing service. WPA's use of a highly iterated implementation of the PBKDF2 function makes such cracks even harder.
Besides changing the password every six months or so and not using a 10-digit phone number, my neighbors could have taken another important step to improve their WiFi security. WPA allows for passwords with 63 characters in them, making it possible to append four or five randomly selected words—'applesmithtrashcancarradar' for instance—that are easy enough to repeat to guests who want to use your wireless network but are prohibitively hard to crack.
Yes, the gains made by crackers over the past decade mean that passwords are under assault like never before. It's also true that it's trivial for hackers in your vicinity to capture the packets of the wireless access point that routes some of your most closely held secrets. But that doesn't mean you have to be a sitting duck. When done right, it's not hard to pick a passcode that will take weeks, months, or years to crack.
With odds like that, crackers are likely to move onto easier targets, say one that relies on the quickly guessed 'secretpassword' or a well-known Shakespearean quote for its security.