│   │   │   │   │   │   │   │   │ 
 

Administrator Password in Windows XP: how to reset it if you forget (in 9 parts)

Part 1. Introduction and Windows Password Reset Disk (PRD)

This articles applies to Windows XP Home or Professional standalone or workgroup computer not in a domain

Topics on this page:

[1] Introduction

[2] Creating a Password Reset Disk (PRD) with the Forgotten Password Wizard

[3] The consequences of resetting or blanking your password

 

Other topics at a glance:

In Part 2:

[4] Methods to reset the Administrator or administrative user password: an overview

  • [4.1] Logon Message, Logon Failed
  • [4.2] the built-in Password Reset Wizard
  • [4.3] You have forgotten the "administrative user account" password, you don't have a PRD but remember the "Administrator" password
  • [4.4] You have forgotten the "Administrator" password

In Parts 3 to 9: Methods to reset the Administrator or administrative user password: individual methods in detail.

In Part 3:

[5] Linux boot disks
  • [5.1] Offline NT Password and Registry Editor 040116

In Part 3a

  • [5.1a] Offline NT Password and Registry Editor 050303
In part 4:
  • [5.2] EBCD 0.6/0.6 Pro

In Part 5:

  • [5.3] Austrumi 0.84

In Part 6:

[6] Commercial text-mode or GUI offline tools
  • [6.1] Windows XP/2000/NT Key or Passware Kit Enterprise

In Part 7:

  • [6.2] CIA Commander 1.0
In Part 8:
  • [6.3] ERD Commander 2002/2003: Locksmith utility

In Part 9:

[7] Other methods

[8] Not recommended and ineffective methods

  • [8.1] Not recommended: delete the SAM
  • [8.2] Ineffective: hack the logon screensaver
  • [8.3] Ineffective for the Administrator account and unnecessary for other accounts: Safe Mode with command prompt

[9] Summary

Reference

 

 

 

1. Introduction

1.1. Good practices

This series would rescue you from having to reinstall Windows XP when you forget your administrator password and to prevent this happening. It also reviews critically and demonstrates some of the other methods so you will have a choice of the tools that best fit your needs. If you cannot logon to Windows at all you will have to resort to using one of the available alternate methods. This is an interesting subject and is not in MCP/MCSE curriculum.

Should you lose your Windows XP user account password it is really your own fault by not remembering it or having made a password reset disk beforehand (see below). Also setting a password hint would help if you are forgetful.

You should not use the Administrator account for daily routine work in any case but with another administrative account or limited account. This way, if you lose your own account password there is still the Administrator account to fall back on.

 

1.2. Administrator and administrative user accounts in Windows XP Professional and Home Editions

1.2.1. Administrator and administrative user accounts are not the same in Windows XP Professional

Don't panic: first ask if your account is the built-in Administrator account (equivalent to Unix/Linux root administrator); this account cannot be deleted (but can be renamed or disabled via Local Security Policy) and is referred to with a capital A in this article as it appears on the Windows XP Start menu (fig. 1) and in User Account when logged on as Administrator (see fig. 2 below).

If instead it is a user account with administrative privileges (with a small letter "a" in this article) which you can create or delete after installation, it would be less drastic to lose the password in this scenario because you still have the built-in Administrator account to fall back on.

 

Fig. 1. Built-in Administrator account in Windows XP Professional.

 

In factory desktop and laptop computers with Windows XP Professional pre-installed (not as common as with Windows XP Home Edition in factory computers), the Administrator password should be blank when set up by the factory using Sysprep (Windows System Preparation tool).

Normally when you start up the computer for the first time, the Sysprep Mini-Setup Wizard runs and prompts you for some customised settings, including the Administrator password. So this is a scenario whereby the Administrator password may be left blank or otherwise. When you manually install Windows XP Professional, Setup will prompt you for the Administrator password. For Windows XP Home Edition, read on.

 

1.2.2. The Administrator account password is blank in Windows XP Home Edition by default

The Administrator account is BLANK (no password) in Windows XP Home Edition by default (whether you install it manually or use Sysprep) and is normally inaccessible except in Safe Mode. So if you haven't set a password (or are not even aware of this account) it should not be a problem if you normally use another administrative user account. In contrast during setup in Windows XP Professional you will be prompted to create a password (it doesn't do that in Windows XP Home Edition during Setup), unless you deliberately chose a blank password during Setup.

 

1.3. Be prepared: make a Password Reset disk (PRD) now

You should have prepared a Password Reset disk straight after installation in case you forget the password. If you haven't done so, I strongly urge you to do it now by following the steps below. It is by far the simplest thing to do for prevention for both types of accounts. It, however, cannot be used for domain accounts (which can be hacked via different means).

 

1.4. Security Account Manager (SAM)

If you don't have this password reset disc it means trouble because the registry Security Account Manager (SAM) contains your encrypted password in binary and cannot normally be accessed or changed outside Windows environment. If you use NTFS there is an extra barrier for reading the file in DOS or Linux but it can be done, as will be shown later.

 

1.5. A few comments on the methods

The methods used are destructive: they reset a new password or blank it and do not recover the lost one. Therefore it has potentially serious consequences (see below). All the available methods (Linux or DOS based) work for FAT and NTFS. I've only evaluated them on the English US version of Windows XP Professional. I cannot say if they will work equally well in other localised language versions (but they should).

The methods for Windows XP in a domain and Windows Server 2003 are not the same and will not be covered here (see the references). Also some of the methods published elsewhere (which applied to Windows NT and 2000) no longer seem to work in Windows XP (presumably because of tightened security) and I will discuss them in the last part.

Doing a repair installation would not help because it asks you for the Administrator password during set up. You can of course reformat and reinstall Windows XP but you lose all your data and settings. That is one of the compelling reasons why you should not keep your data in My Documents or in the Windows (boot) partition. You can move My Documents elsewhere or redirect it centrally if joined to a domain.

You can move your hard disc temporarily to another Windows XP computer as slave and retrieve your data before reformatting but that is tedious to do.

The available methods in broad categories are:

  • Windows XP Password Reset disk - preventative measure
  • Linux boot disks (see their respective articles):
    Offline NT Password and Registry Editor
    EBCD
    Austrumi
  • commercial off-line GUI or text-mode tools (see their respective articles):
    Windows XP/2000/NT Key (or as part of Passware Kit Enterprise)
    CIA Commander
    ERD Commander 2002/2003/2005
  • other methods and tools not yet tested by me (in no particular order):

    - John the Ripper password cracker 1.6 ("John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.")

    - O&O BlueCon XXL Administrator's Suite 5 (commercial tool which runs in DOS, also as part of O&O ToolBox Server. "The new version of O&O's unique "Blue Screen Administration Software" now offers the administrator even more ways to rescue data and systems under Windows XP, Windows 2000 and Windows NT....Key Features: Reset lost and forgotten passwords")

    - NTAccess 1.5 (commercial tool which "...can replace the administrator password of a Windows NT, Windows 2000, Windows XP or Windows Server 2003 system by rebooting the computer with a special set of boot disks....NTAccess only changes the password of the built-in administrator account, it does not affect any other accounts or any registry settings and does not destroy any information on the system." It uses the press F6 for SCSI drivers during Setup. two demo versions can be downloaded.)

    - @stake LC5 (more updated version of LC3 and LC4; commercial tool, used with pwdump2 or pwdump3; @stake has been acquired by Symantec in 2005)

    - Proactive Password Auditor (formerly Proactive Windows Security Explorer, "...is a password security test tool that's designed to allow Windows� NT, Windows� 2000, Windows� XP and Windows Server 2003-based systems administrators to identify and close security holes in their networks."). The same company also makes the related tool: Proactive System Password Recovery (formerly Advanced Windows Password Recovery, "... a program to recover most types of Windows passwords: ... * Windows NT4/2000 logon password (when user is logged on and has Admin privileges)).

    - Cain & Abel ("... a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.")

    - NTCrack v.2 ("NTCrack is basically a Windows NT/2000 password cracker which uses the MD4 hashes produced by pwdump2 of Todd Sabin.")

    - MDCrack-NG 1.2 ("... offers a nice, easy to use, graphical interface to control MDCrack's engine and offers even more: A convenient hash generator to quickly compute and export hashes into MDCrack's core engine. A password generator allows to create batch of passwords made of up to 5000 random passwords, generated in a row, compliant with your policy, built with one of MDCrack-NG's secured pseudo random generators.")

    - BO2K ("BO2K is the most powerful network administration tool available for the Microsoft environment, bar none. ...Native Server Support: NT registry passwords and Win9x screensaver password dumping")

    - NT/2000 Admin password cracker (Linux floppy boot image, exact nature to be verified but it may well be an old 2000 version of Offline NT Password and Registry Editor; there are many versions of this on the internet. Included here pending verification)

    - SAMInside: "Includes over 10 types of data import and 6 types of passwords attack: Brute-force attack; Distributed attack; Mask attack; Dictionary attack; Hybrid attack; Pre-calculated tables attack...The program is the first utility in the world which started to work with passwords encrypted by system key SYSKEY!"

    - Ophcrack 2.0: "A Windows password cracker based on the faster time-memory trade-off using rainbow tables...The Ophcrack LiveCD is a bootable Linux CD-ROM containing Ophcrack 2.0 and a set of tables. It allows for testing the strength of passwords on a Windows machine without having to install anything on it. Just put it into the CD-ROM drive, reboot and it will try to find a Windows partition, extract its SAM and start cracking."
     
    - Microsoft Windows PE: loading the SAM offline with regedit and blanking the SAM Administrator password hash (initial results are promising, pending more trials). No extra plug-ins are needed.

    - Bart's PE with Windows Password Renew 1.1-BETA plug-in

    Password dumping tools:

    - pwdump (by Jeremy Allison), pwdump2 (by Todd Sabin, "This is an application which dumps the password hashes (OWFs) from NT's SAM database, whether or not SYSKEY is enabled on the system.") or pwdump3, different versions of remote password hash grabber, in conjunction with LC5 or NTCrack). There is a pwdump4 release.

    - Samdump

    Bypassing logon password authentication without resetting password

    - DreamPackPL: "This is the only soft that allow you to log on into any local account without reset existing passwords.
    DreamPackPL will just turn off the password validation process. If you dont want to log on into any existing account, then you can execute any application (e.g. Regedit or window with accounts management) at the logon desktop. You may also load the Explorer shell at new desktop and work with admin privileges."

    Online recovery service for a fee

    - Login Recovery ("Login Recovery is a service to reveal user names and recover passwords for Windows NT, 2000, XP, 2003 and Longhorn...It simply reads the encrypted passwords for processing through our servers." This appears to use a tool to dump the password and you have to send the results to the website for analysis. The website has a floppy or CD image file for free download. Its inclusion in this article does not necessarily mean my recommendation. For reference only.)

     
  • Not recommended:
    Delete the SAM
  • As a last resort and if you cannot use the above methods
    Reinstall (if you don't care about data loss or have another bootable installation to copy the data first)
  • No longer works in Windows XP
    hack the logon.scr
  • Useless for the Administrator account (and unnecessary for the other accounts):
    Safe Mode with command prompt - you can forget about it

 

1.6. Windows XP Recovery Console Password authentication

Normally the Administrator account password is required to logon to the Recovery Console, unless this requirement has been cancelled via a policy (read my article on Group Policy). So don't expect to go to the Recovery Console to do anything if the password is forgotten.

There is a problem if your Administrator account (blank or otherwise) is not accepted (even though it is normally valid) when trying to logon to the Recovery Console in factory computers due to a bug in the password authentication process when Windows XP is installed using Sysprep (KB 308402). The KB article advised installing SP1 (which didn't solve it when I tried; I haven't tried it after SP2) or use the new set of bootable floppy disks. It has also been reported (but unconfirmed) that using one of the methods described in this series to blank the password can solve this.

 

1.7. Important: Disclaimer and warning

It's not my intention whatsoever to teach you how to crack other users' passwords or other computers without permission or where it is illegal but just to offer some tips to manage your own password legitimately. Be warned that I shall not in any way be liable for your actions. Also, the instructions in the article are for demonstration purposes and in no way reflect what I do. I am not affiliated with any of the software developers or commercial companies mentioned.

 

 

2. Creating a Password Reset Disk (PRD) with the Forgotten Password Wizard

You need to make a separate floppy for each account which is logged on. You cannot make all the reset disks from within one account. The disk won't work on another account whether or not a reset disk was made or on another computer.

To run the Forgotten Password Wizard, logon to your Administrator or administrative user account.

To logon the Administrator account in Windows XP Professional, press Ctrl + Alt + Del twice at the Welcome screen or enter Administrator in the User Name box in the classic logon screen.

In Windows XP Home edition, you have to press F8 to go to Safe Mode before the seeing the Administrator account in the Welcome screen (you only need to type the Administrator password if you have set a password before).

After you log on, go to Control Panel, User Accounts, click on your account in the bottom; here the Administrator account is used as an example (fig. 2). You can access the Control Panel in Safe Mode in Windows XP Home edition.

Control Panel, User Accounts

Fig. 2. Control Panel, User Accounts

 

In the next User Accounts window on the left pane, under Related Tasks, click Prevent a forgotten password (fig. 3). This option is only available for the account that you are currently logged on. You cannot make a PRD for other accounts other than the one you're logged on even if you're logged on as Administrator or administrative user.

Prevent a forgotten password link

Fig. 3. Prevent a forgotten password link.

 

Follow the instructions in the wizard (fig. 4). Note that you only need to do this once even when you change or reset your password later.

Welcome to Forgotten Password Wizard

Fig. 4. Welcome to the Forgotten Password Wizard.

 

Insert a blank formatted floppy (fig. 5).

insert a blank formatted floppy

Fig. 5. Insert a blank formatted floppy.

 

You need to know your account password and enter it and click Next (fig. 6).

Type your current account password

Fig. 6. Type your current account password.

 

The file Userkey.psw is written onto the floppy (fig. 7 and 8).

File is written onto the floppy

Fig. 7. File is written onto the floppy.

 

userkey.psw file

Fig. 8. userkey.psw file

 

Click Finish (fig. 9) to exit. Label and keep the floppy in a safe place. Repeat the above steps for each account.

Completing the wizard

Fig. 9. Completing the wizard.

 

3. The consequences of resetting or blanking your password

If you don't reset your password in the normal way but instead crack or blank it by other means you may lose data files or settings such as:

  • Files and folders encrypted with Windows XP's encryption file system (EFS) in Windows XP Professional;
  • Security certificates
  • Passwords stored for accessing networked computers and
  • Internet passwords stored in Internet Explorer's Autocomplete.

See figures 7 and 11 in Part 2 for illustrations showing such warnings. Encrypted folders using EFS is usually impossible to recover unless you have another recovery agent. One tool (Passware Kit Enterprise, see Part 6) claims it can but I've tried its EFS recovery tool.

I will mention SAM again in Part 9 but I should warn you right at the outset. If you try the drastic measure and delete the registry SAM key which stores your user passwords you will lose your user account and everything that ties with it. It is like deleting your user account in the normal way in User Accounts. Even when you re-create your account with the same name, you will not be able to recover your data because your old user folder will have been deleted and a new one created.

 

To be continued in other parts.

Go to TOP

Go to Part 2

 

Copyright � 2003-2005 by Kilian. All my articles including graphics are provided "as is" without warranties of any kind. I hereby disclaim all warranties with regard to the information provided. In no event shall I be liable for any damage of any kind whatsoever resulting from the information. The articles are provided in good faith and after some degree of verification but they may contain technical or typographical errors. Links to other web resources may be changed at any time and are beyond the control of the author. Articles may be added, removed, edited or improved at any time. No support is provided by the author.

This is not an official support page for any products mentioned. All the products mentioned are trademarks of their companies.

Created 2 Mar 2004; last updated 21 June 2006