Hey Folks, in this tutorial we will discuss the next method to crack window 10 login password using kali linux operating system. There are many other ways by which you can easily crack the window machine logon password, one of which we have discussed in our previous article. Lets start discussing about this topic without wasting any time.
So when we go to crack the login password of the window machine then we need hashes which is stored within the Windows SAM file at C:\Windows\System32\config location.
Letβs take a look π !!
Letβs start making bootable USB. Just you need to follow the instructions given below.
After successfully creating a bootable USB, your USB will look like the image below. Just ignore it.
Go back to the login screen and enter the wrong password 1 to 2 times to create SAM logs into the system.
Ready π !! Just connect the bootable USB to the computer USB port and enter the BIOS setup by pressing the special key (ESC) via the keyboard ( It may be difficult according to the different-2 computers ), select bootable USB and you will get the interface as shown in the given picture. Now click on the first option and proceed ahead.
Done π !! Finally we have entered into the kali linux operating system, so letβs start the process of cracking the password of window 10 machine.
Locate the file manager and open it. After opening it then go to the βother locationsβ option and select the second directory where SAM is saved. The directory we have selected is the C drive of the window machine where the window is installed.
Hmm π !! After that Right-click on a blank space in File Manager, and select Open Terminal Here. After that we will go to the β/Windows /System32/config/β location one by one using the cd command. Now we have reached the place where the SAM file is kept.
Basically we are unable to read the SAM file which is why we will use chntpw tool which will crack the window 10 password itself. You can check all the features of this tool by execute the following command.
chntpw
Through the following command we can check all existing users in the window machine.
chntpw -l SAM
Now we need to select the user whose password we want to crack. Just replace the username and execute the command. Immediately after executing the command it gives the menu to choose what you want to do. All you have to do is proceed by selecting option 1.
Usage π !! chntpw -u < username > SAM
chntpw -u hp SAM
Done π !! To stop editing in the user configuration enter βqβ and reboot the system.
BOOM π !! You do not need to enter any password, just hit enter on the login screen and you will be logged into the system successfully.
PWDump is a tool can be control within a command-line interface that used to extract the NTLM (LanMan) hashes from βLSASS.exeβ in memory. This time we will go through the file manager on the βsystem32β directory and right-click to open the terminal.
Now we need to go to βconfigβ directory to obtains the SAM files. All SAM files and their logs are saved here.
Dump π !! As you can see, all hashes of existing users are dumped. Now we can crack these hashes using john the ripper and other kind of tools and get the password. If you want know the complete processing then you can read this article.
pwdump SYSTEM SAM
It is an also in-built and small utility designed to dump hashes with the help of SAM files. If in some case the pwdump tool does not work well then you can use another option of that tool called βsamdump2β. Just execute the following command and dump hashes.
samdump2 SYSTEM SAM
We think john the rippper tool would be the best option for cracking windows 10 passwords. You can check complete article on it from here.
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.
View Comments
Nicely written & done!
I've only just begun blogging in the past few weeks
and have seen many writers simply rework oldd content but add veery little of benefit.
It's terrific tto ssee an enlightening articfle of some real value to
your readers and me.
It is going down on my list of details I need to replicate being a new blogger.
Audience engagement and content quality are king.
Many terrific thoughts; you've unquestionably made it on my list of blogs to follow!
Continue the fantastic work!
Cheers,
Phil