Recover Windows Password Using OphCrack


Forgot Windows 7 password and can’t log on to your local account on the laptop or desktop? I believe that you’ve faced this issue several times. There are tons of free tools which can be used to recover Windows 7 password. One of the most popular software is Ophcrack, which can run from a CD or USB drive and enable you to recover Windows 7 password without reinstalling.

Note:  Ophcrack is only intended for computer geek, not ordinary, nontechnical folk. For average computer users, the most efficient and easiest way is to use Reset Windows Password utility.
Ophcrack is a free (open source) Windows password cracker/recovery tool based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and could be used to recover Windows 7/Vista/XP password.
Steps :
1. Download appropriate OphCrack Version.
  (OphCrack versions for windows xp and Vista+Win7+win8 are different)
 

Windows Password Cracking Or Recovery

We can recover or remove the password from the Encrypted Hash

Option for this Are:

1.We can remove the hash from the SAM file, which will remove the password from that User
Account. Next time we will try to login, windows will not ask for the password.

2.We can replace the hash in the sam file with new hash, which will replace the password for
 that user Account. Next time we will try to login, windows will not ask for the newly replaced
 password.

All this we can do with the :

1.CMD (Command Prompt)
2.Automated Password Cracking Tool(e.g. OphCrack, Cain and Able, ERD Commander etc.)
 

Windows User Account Attacks

We can recover or remove the password from the Encrypted Hash

Option for this Are:

1.We can remove the hash from the SAM file, which will remove the password from that User
Account. Next time we will try to login, windows will not ask for the password.

2.We can replace the hash in the sam file with new hash, which will replace the password for
 that user Account. Next time we will try to login, windows will not ask for the newly replaced
 password.

All this we can do with the :

1.CMD (Command Prompt)
2.Automated Password Cracking Tool(e.g. OphCrack, Cain and Able, ERD Commander etc.)

To See how it Works Click here
 

Cracking Windows User account Password


• Passwords are Stored and Transmitted in an encrypted form called a Hash. When a User logs on to a system and enters a password, a hash is generated and compared to a stored hash. If the entered and the stored hashes match, the user is authenticated (This is called the Challenge/Response).

• Passwords may be cracked Manually or with Automated tools such as a Brute-force method or the Rainbow Table attack.


 

Windows User Account Architecture


• User account passwords are contained in the SAM in the
Hexadecimal Format called Hashes.

• Once the Passwords converted in Hashes, you cannot
convert back to the Clear Text.


 

Security Architecture of Windows

There are three main components of Windows Security:

• LSA (Local Security Authority)
• SAM (Security Account Manager)
• SRM (Security Reference Monitor)

)
                                            (Image Source : http://www.bollymovies.ucoz.com)
  • LSA (Local Security Authority)

• LSA is the Central Part of NT Security. It is also known as Security
Subsystem. The Local Security Authority or LSA is a key component of
the logon process in both Windows NT and Windows 2000. In Windows
2000, the LSA is responsible for validating users for both local and
remote logons. The LSA also maintains the local security policy.

• During the local logon to a machine, a person enters his name and
password to the logon dialog. This information is passed to the LSA,
which then calls the appropriate authentication package. The password
is sent in a non-reversible secret key format using a one-way hash
function. The LSA then queries the SAM database for the User’s
account information. If the key provided matches the one in the SAM,
the SAM returns the users SID and the SIDs of any groups the user
belongs to. The LSA then uses these SIDs to generate the security
access token.

  • SAM (Security Account Manager)

• The Security Accounts Manager is a database in the Windows
operating system (OS) that contains user names and passwords.
SAM is part of the registry and can be found on the hard disk.

• This service is responsible for making the connection to the SAMdatabase
(Contains available user-accounts and groups). The SAMdatabase
can either be placed in the local registry or in the Active
Directory (If available). When the service has made the connection
it announces to the system that the SAM-database is available, so
other services can start accessing the SAM-database.

• In the SAM, each user account can be assigned a Windows password
which is in encrypted form. If someone attempts to log on to the
system and the user name and associated passwords match an entry in
the SAM, a sequence of events takes place ultimately allowing that
person access to the system. If the user name or passwords do not
properly match any entry in the SAM, an error message is returned
requesting that the information be entered again.

• When you make a New User Account with a Password, it gets stored in
the SAM File.

• Windows Security Files are located at

“C:\Windows\System32\Config\SAM”

• The moment operating system starts, the SAM file becomes
inaccessible

  • SRM (Security Reference Monitor)

• The Security Reference Monitor is a security architecture component
that is used to control user requests to access objects in the system.
The SRM enforces the access validation and audit generation. Windows
NT forbids the direct access to objects. Any access to an object must
first be validated by the SRM. For example, if a user wants to access a
specific file the SRM will be used to validate the request. The Security
Reference Monitor enforces access validation and audit generation
policy.

• The reference monitor verifies the nature of the request against a table
of allowable access types for each process on the system. For example,
Windows 3.x and 9x operating systems were not built with a reference
monitor, whereas the Windows NT line, which also includes Windows
2000 and Windows XP, was designed with an entirely different
architecture and does contain a reference monitor.
 
 
Support : BILAL SHAIKH | BILAL SHAIKH | ALL TECHNO GEEKS
Copyright © 2011. All Techno-Geeks - All Rights Reserved
Template Created by BILAL SHAIKH Published by ALL TECHNO GEEKS
Proudly powered by Blogger