Windows server2008 cracked password without system CD
Today suddenly think of password cracking this thing, decided to find out the way I say, do not know that foreigners have done so! The online search of windows server2008 cracked passwords are required CD-ROM, but in the time of the crack is the need for original CD-ROM, at first, so that the original CD-ROM can only be re-installed, and later still do not give up, decided to study, or have the results. Still need tools: a PE system (a ghost system disk or a peu disk); then get to the point!
1. Install the Ghost boot disk or the PE u disk/boot disk to the machine and set the Bios-boot startup key:
(In this is the Ghost system disk), then F10 save reboot.
650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M02/7B/DB/wKioL1bOeVWzHJffAACUpJFE3KY896.png "title=" 1.png " Width= "height=" 448 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:600px;height:448px; "alt=" Wkiol1boevwzhjffaacupjfe3ky896.png "/>
2. Go to the Ghost System entry and select Run PE system:
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M00/7B/DD/wKioL1bOefSz2jTUAANvwJ0poM4256.png "title=" 2.png " Width= "height=" 438 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:600px;height:438px; "alt=" Wkiol1boefsz2jtuaanvwj0pom4256.png "/>
3. To the C:\Windows\System32 folder, find Osk.exe, to make a copy to do backup, backup file best placed in the folder below, (I here is placed on the PE desktop, but restart the file does not save)
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/7B/E0/wKioL1bOe2KC8HbwAADDLsZCyWI931.png "title=" 3.png " Width= "height=" 387 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" WIDTH:600PX;HEIGHT:387PX; "alt=" Wkiol1boe2kc8hbwaaddlszcywi931.png "/>
4. Delete osk.exe file, error "Access Denied":
650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M02/7B/E1/wKioL1bOe7zzjR4dAABIibObTSI461.png "title=" 4.png " alt= "Wkiol1boe7zzjr4daabiibobtsi461.png"/>
5. proceed to the critical stage:
Select Osk.exe file Right-click → properties → security → advanced
(Note: Now the administrator permission is gray, you cannot set the change)
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/7B/E5/wKioL1bOfJGClSdKAABnvgQUlg8714.png "title=" 5.png " alt= "Wkiol1bofjgclsdkaabnvgqulg8714.png"/>
Advanced entry → review → Edit
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M02/7B/E6/wKiom1bOfFXThHFIAAClbWqvVqU552.png "title=" 6.png " Width= "height=" 476 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:600px;height:476px; "alt=" Wkiom1boffxthhfiaaclbwqvvqu552.png "/>
Edit popup new Window → success below select Full Control → OK:
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M01/7B/E7/wKiom1bOfJ3xxQ6sAAB3LFVD4gU113.png "title=" 7.png " alt= "Wkiom1bofj3xxq6saab3lfvd4gu113.png"/>
Now back to the security option, the administrator corresponding permission becomes white on the background and can be modified:
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M01/7B/E7/wKioL1bOfVqhYuPuAABePM-wI_w849.png "title=" 8.png " alt= "Wkiol1bofvqhyupuaabepm-wi_w849.png"/>
Allow bottom selection Full Control → OK exit:
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M00/7B/E7/wKioL1bOfXuwLLuSAAB0afIZ-mg751.png "title=" 9.png " alt= "Wkiol1bofxuwllusaab0afiz-mg751.png"/>
Then this time, select Osk.exe, delete, delete successfully. (There is no excitement!) O (∩_∩) o)
6. copy a copy of cmd below the C:\Windows\System32 folder:
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/7B/EB/wKiom1bOffjSkECCAACRnV_Ajlc410.png "title=" 10.png "Width=" "height=" 405 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:600px;height:405px; "alt=" Wkiom1boffjskeccaacrnv_ajlc410.png "/>
7. Rename the copy of CMD as Osk.exe:
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M01/7B/EC/wKiom1bOfjvzzaqIAACQtybQ4Co808.png "title=" 11.png "Width=" "height=" 417 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" WIDTH:600PX;HEIGHT:417PX; "alt=" Wkiom1bofjvzzaqiaacqtybq4co808.png "/>
8. You can restart the system to enter the user login screen, Click the Easy Access button in the lower left corner, tick ' do not use the keyboard type (on-screen keyboard) '
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M00/7B/EB/wKioL1bOfvWznaoOAABaioe9jL0023.png "title=" 12.png "Width=" "height=" 448 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:600px;height:448px; "alt=" Wkiol1bofvwznaooaabaioe9jl0023.png "/>
9. Then change the password for the administrator or administrator:
The format is: NET user username new password
NET user Administrator [email protected] (set Administrator password for [email protected])
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/7B/ED/wKiom1bOfw2hvkMQAABGo2u7IWY046.png "title=" 13.png "Width=" "height=" 392 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:600px;height:392px; "alt=" Wkiom1bofw2hvkmqaabgo2u7iwy046.png "/>
10. Prompt "Command completed successfully", close the window, Ctrl+alt+del, and then enter the password, enter the system, the successful hack completed.
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M00/7B/EC/wKioL1bOf9qRanp3AACPzf3hWSc502.png "title=" 14.png "Width=" "height=" 414 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:600px;height:414px; "alt=" Wkiol1bof9qranp3aacpzf3hwsc502.png "/>
If you have a better solution can be discussed together!
This article is from "Yangdong Hao" blog, please make sure to keep this source http://506554897.blog.51cto.com/2823970/1744962
Windows server2008 cracked password without system CD