Description: KonBoot Site: http://www.piotrbania.com/all/kon-boot/
Any questions comment on the video.
Tags: hacking konboot bypassing windows login authentication howto tutorial ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Great idea!
What versions of Windows does it run on?
Does it log on as admin so you can reset the forgotten password?
(I'm looking the answers up but it would be nice to have the answers posted here)
This runs from 2k to windows 7. And if your looking to reset a password "Ultimate Boot CD".
Looks like this costs $15 per six months to licence it.
https://secure.avangate.com/order/product.php?PRODS=3845288&QTY=1
http://www.piotrbania.com/all/kon-boot/ free version.
The free version also comes as part of the Katana kit. Check Iron Geeks post on curing the circular reboot issue.
The pay version does 64 bit also. A licence is required
That's great news. Thanks.
I tested the free version it works up to windows Vista, did not work on windows 7 for me.
However if you buy a license it should work up to windows 7.
awesome tool easy to use ;)
Or you could just go old skool and use the Pitr Nordahl tool. This is just a gui on top of that tool I think...
chntpw is the name of the tool i think...and it's on backtrack, or it was as of bt4r2
There's also 'Offline NT Registry Editor' - this can be used to change or reset account passwords, including Windows 7. However, if you want to access the account without changing the password (in cases where you want to remain covert and the user doesn't know you've been on their password-protected machine), use something like BackTrack to access the filesystem, make a spare copy of the SAM and SYSTEM files at \Windows\System32\Config, then reboot and run 'Offline NT Registry Editor'. When you've gained access, done whatever you wanna do, boot back into BackTrack and copy back the SAM and SYSTEM files. Old password is returned. Tested and worked for me anyway.
Really liking that tool.
Just so i understand this correctly; It effectively re-boots the inserts the hook into the BIOS and amends the kernel thus bypassing the authentication logon process.