Analysis on the internal principle of resetting a Windows 7 password Disk

Source: Internet
Author: User

Some brothers may think that resetting a password disk is a rare skill, which is very simple, or even a chicken. Since we are not afraid of having to create a password resetting disk, how can we forget the password so carelessly?

In fact, the principle behind it is still very interesting. Here we will try a simple analysis.

In the Windows XP era, we know that when a user creates a password to reset a disk, Windows automatically creates a pair of public and private keys and a self-signed certificate. Next, the user's account password will be encrypted with the obtained public key, and then saved in the Registry key hkey_local_machinesecurityresid <SID>, where <SID> refers to the user's SID. The private key is deleted from the computer and saved on a floppy disk.

In the Windows 7 era, we know that the private key will be stored in a floppy disk or USB flash memory in the form of a userkey. psw file.

However, if we try to view the HKEY_LOCAL_MACHINESECURITYRecovery registry key, we find that it is empty and there is no user SID.

So where is the user password encrypted with the public key stored? Obviously, if there is a private key without a copy of the account password encrypted by the public key, the password of the user account cannot be obtained.

After research, it is found that (the basin uses Process discovery to automatically create a Recovery. dat registry configuration single-element file, which is saved in the C: WindowsSystem32MicrosoftProtectRecovery folder. The lsass.exe process automatically loads it into the registry HKLMC80ED86A-0D28-40dc-B379-BB594E14EA1B. C80ED86A-0D28-40dc-B379-BB594E14EA1B meaning unknown, Google has no results, which boss knows, please don't hesitate to advise.

After the password reset disk is created, the lsass.exe process automatically uninstalls the Registry Configuration unit, so we cannot view the content under the HKLMC80ED86A-0D28-40dc-B379-BB594E14EA1B. However, it is easy to think that you can use the following methods to view:

Open the Command Prompt window with the administrator privilege and run the following command to start the Registry Editor as a Local System (rediscovery. dat can be loaded only with the Local System privilege ):

Psexec-s-I-d regedit

Select the HKLM registry Root Key, click the file, load the Configuration unit, and locate the C: WindowsSystem32MicrosoftProtectRecoveryRecovery. dat file.

In the following dialog box, specify any item name, for example, Test, and expand the subitem to view the SID of the current Logon account and the default key value on the right, that is, a copy of the account password encrypted with the public key is saved.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.