Sponsored
Ethical Hacking

Multiple Methods to Crack Windows 10 Password

Hey Folks, in this tutorial we will tell you about various ways by which you can silently bypass or crack the logon password of any window 10 machine using bootable USB. If we look at it from another point of view, as we know that people are afraid of hackers and their fraud, so they enforce strict security in their system to protect themselves but they forget the password after implementing the security is what they set before, hence this article can also be helpful for those who have forgotten the password set earlier and now want to retrieve the password.

Requirements to crack window 10 password

  • Window 10 ISO Image – Donwload here
  • CD/DVD or USB drive with at least 8 GB
  • Rufus Softrware – Donwload Here

Let’s take a look πŸ˜› !!

Make Bootable USB of window 10

There are several tools available for making bootable USB which we list below.

  • YUMI – Multiboot USB Creator
  • WinSetUpFromUSB
  • DiskMaker X
  • UNetBootin
  • EaseUS
  • Rufus
  • Windows USB/DVD Tool
  • Universal USB Installer
  • RMPrepUSB
  • Etcher

You can use all the above tools but in our case we will use the Rufus tool to create a bootable USB. Don’t think too much, just follow the steps given to make Windows 10 bootable USB.

  • Step-1 First download the Rufus tool using the link above.
  • Step-2 After that boot the software, download the ISO image of window 10 using the link given above.
  • Step-3 After downloading the image file, then click on Select, browse the ISO image and select it.
  • Step-4 Just click on start and complete the process of making bootable USB.

What we are going to do ?

Usually the window machine has an β€œease of access” button in the bottom right corner, where we get the β€œon-screen keyboard” option after clicking on that button, so only we will change the cmd.exe application to the osk.exe via command prompt and the results, you can open a command prompt before login inside the window machine, change the password and then enter the machine successfully. Understand πŸ˜› !!

Let’s Start Cracking Window 10 Password

Our bootable USB is ready, so just connect the bootable USB to the computer USB port and enter the BIOS setup by pressing the special key (ESC) via the keyboard ( It may be difficult according to the different-2 computers ), select bootable USB and you will get the interface as shown in the given picture. Click on β€œnext” button.

Just click on β€œRepair your computer” button and go further.

Now click on β€œtroubleshoot” option and proceed to arrive at the destination : P !!

We’ve got the main option β€œCommand Promptβ€œ, so just click on it and boot the command prompt.

Replace cmd.exe with osk.exe application

We have already told you the purpose of executing these commands so that you do not need to give more information about these commands. But make sure you should know the path of β€œ/window/system32/” drive. After finding it just go to the location of system32 directory and execute the given command. After executing the above all commands then reboot the system.

c:
cd Windows
cd System32
ren osk.exe osk.exe.bak
copy cmd.exe osk.exe

Done πŸ˜› !! When we click on the highlighted option, the β€œosk.exe” service gets activated and keeping this in mind we just replace this application to the cmd.exe through the copy command and when we click on it then the command prompt (cmd.exe) is activated on the login screen. Now just hit enter on this option.

BOOM πŸ˜› !! As you can see when we click on β€œOn-Screen Keyboard” option then the CMD prompt gets activated with an administrator privileges. After booting the cmd prompt all we have to do is change the password of the existing user using the β€œnetuser” command.

User πŸ™‚ !! net user < login username > < new password >

net user hp 12345678

That’s it πŸ˜› !! We got success because you can see that we have successfully logged into the system.

Replace cmd.exe with Utilman .exe application

Now here also we will follow the same procedure and first go to system32 directory then rename (Utilman .exe) application and finally we will replace cmd.exe application with Utilman .exe via copy command. Alright πŸ˜› !! just execute the command. After execute the following commands then reboot the system and stay on system login.

c:
cd Windows
cd System32
ren Utilman .exe Utilman .exe.bak
copy cmd.exe Utilman .exe

Ready πŸ˜› !! Look at the image below where we have indicated the button on which to click to activate the cmd prompt.

Done πŸ˜› !! That’s what we thought ! after hit enter on β€œEase of Access” button immediately cmd prompt get activated with admin rights. As before, we will change the password of the existing user through the β€œnetuser” command and enter into the system successfully.

User πŸ™‚ !! net user < login username > < new password >

net user hp 12345678

Replace cmd.exe with sethc.exe ( Sticky Key ) application

As you have seen, when we press multiple keys at the same time (such as hit shift button five times) we get a sticky key warning on the screen (both before and after login). So just we will replace cmd.exe executable service with sethc.exe which shows us the alert on screen after which the cmd prompt will be activated when we press the key in sequence. Just execute the following command and reboot the system after doing it.

c:
cd Windows
cd System32
ren sethc.exe sethc.exe.bak
copy cmd.exe sethc.exe

Great πŸ˜› !! Now when we hit the shift button five times in sequence, we get a CMD prompt instead of a sticky key alert.

User πŸ™‚ !! net user < login username > < new password >

net user hp 12345678

Done πŸ˜› !! Finally after changing the password using β€œnetuser” command we can successfully log in to the system.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

  • What a stuff of un-ambiguity and preserveness of valuable experience about unexpected feelings.

  • I do not even know the way I ended up here, but I believed this publish was
    once great. I do not realize who you might be however definitely
    you're going to a well-known blogger in case you aren't already.
    Cheers!

  • Wow that was odd. I just wrote an extremely long comment but after I clicked submit my comment didn't appear.
    Grrrr... well I'm not writing all that over again. Anyway, just wanted to say
    excellent blog!

  • I have been surfing online more than three hours today,
    yet I never found any interesting article like yours. It is pretty
    worth enough for me. Personally, if all webmasters and bloggers made good
    content as you did, the web will be a lot more useful than ever
    before.

  • If some one needs to be updated with hottest technologies therefore he must be pay a quick visit
    this website and be up to date everyday.

  • My partner and I absolutely love your blog and find almost all
    of your post's to be precisely what I'm looking for.
    Does one offer guest writers to write content for you? I wouldn't mind creating a post
    or elaborating on a few of the subjects you write in relation to
    here. Again, awesome web log!

  • Hi! Do you use Twitter? I'd like to follow you if that would be okay.

    I'm absolutely enjoying your blog and look forward to
    new posts.

  • Hey would you mind letting me know which webhost you're working with?
    I've loaded your blog in 3 completely different browsers and I must say this blog loads a lot faster then most.

    Can you suggest a good hosting provider at a honest price?
    Kudos, I appreciate it!

  • I needed to thank you for this very good read!!
    I definitely enjoyed every little bit of it. I've got you
    bookmarked to look at new stuff you post…

  • Simply want to say your article is as amazing.
    The clearness in your post is simply cool and i could assume you're an expert
    on this subject. Well with your permission let me to grab your RSS feed
    to keep updated with forthcoming post. Thanks a million and please continue the enjoyable work.

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

4 weeks ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.