quote:
Originally posted by dbl221:
This is the disk we use in Internet Security class for altering the SAM file......ie changing passwords.
http://home.eunet.no/~pnordahl/ntpasswd/bootdisk.html
Hey, that is one slick disk!! Thanks! I haven't actually run it from floppy yet as is intended, but I did mount the floppy disk image directly and copied the initrd.gz file out if it, then extracted/mounted initrd. Then I copied the "chntpwd" program out of it into my ~/bin directory so I could test it out directly without booting the floppy. Copied my /c/winnt/system32/sam file to /tmp and ran the "chntpwd" program on it and could manipulate it however I wanted (change passwords, navigate the registry, etc). I should have thought of this! And it's all done with Linux! I'll have to burn this onto floppy and stick it in my little bag 'o' tricks.
I guess the source code for chntpwd is out there somewhere, I'll have to check it out.
On another note, if you need to recover your Administrator password and don't have this boot disk there is another way to do it if you know any normal user logon using CMD.EXE and LOGON.SCR. I posted that one in an earlier thread.
[ February 05, 2002: Message edited by: VoidMain ]