Hacking Windows 7 and Server 2008 R2

Have you ever ran into a situation where you didn’t know the local administrator account name or password on a Windows machine? If you work in an enterprise environment the answer is probably yes. As much as we try to manage the local administrator account there will always be room for error. Whether it’s a failed group policy setting, account locked out or the password was manually changed, this is something that all system administrators will eventually encounter.

Here is a easy hack that allows you to find and reset the local administrator account password, or simply create a new local account, on Windows 7/2008 R2 machines. This will not require any special software or tools. As long as you can come up with bootable Windows media you will be able to perform this hack.

What if you are an admin who wants to prevent this hack? That is a great question! I will address this at the end of this post.

Disclaimer: If done incorrectly this hack could leave your machine in an unstable state. Only test on lab or other non-production machines.

How to Hack Windows

  1. Power down the workstation or server.
  2. Insert USB bootable Windows 8.1 OEM media.  If you are working on a virtual machine attach the ISO.
    Note: This will work with any USB or CD/DVD bootable Windows 7/2008 R2 or greater media. 
  3. Power up and boot to your USB boot media.
  4. On the Windows 8 setup screen, click Next.
    Note: Steps 4-8 could also be completed by using the Shift + F10 keyboard shortcut.
    hacking_windows_(10)
  5. Click Repair your computer.
    hacking_windows_(1)
  6. Click Troubleshoot.
    hacking_windows_(2)
  7. Click Advanced options.
    hacking_windows_(3)
  8. Click Command Prompt.
    Note: This will open a command prompt with no permissions.
    hacking_windows_(4)
    hacking_windows_(11)
  9. Type in regedit and click Enter to bring up the Registry Editor.
  10. Click on HKEY_LOCAL_MACHINE, then from the menu click File, Load Hive.
  11. Browse to system drive and navigate to Windows\System32\config (drive letter may vary).
  12. Select Software and click Open.  This will open the Software hive from your Windows media.
    hacking_windows_(5)
  13. Enter a name for this hive (name it anything that you will remember), then click Ok.
    hacking_windows_(6)
  14. Navigate to HLKM\<hive name you entered in previous step>\Microsoft\Windows NT\Current Version\Image File Execution Options
  15. Create a new Registry Key called utilman.exe
  16. Inside the utilman.exe Key, create a new String named debugger. Give it a value of cmd.exe
    Note: The utilman.exe is the Windows Ease of Access utility.  When the above registry key and string value is created, launching the Ease of Access utility will call debugger and open cmd.exe.
    hacking_windows_(7)
  17. Exit the Registry Editor and shut down the machine.
  18. Power up and let the machine boot normally.
  19. On the Windows logon, click the Ease of Access button (WindowsKey + U) in the lower left corner.
    hacking_windows_(8)
  20. This will bring up a command prompt.
  21. Type in whoami and notice you are running as system.
    hacking_windows_(9)

Change an existing user account password

  1. Enter the following command to get a list of all local user accounts.
    net user
  2. Enter the following command to reset the administrator account password to p@ssw0rd
    net user administrator p@ssw0rd

Create a new administrator user account

  1. Enter the following command to create a new user account called johnyfive with a password of P@ssw0rd
    net user johnyfive p@ssw0rd /add
  2. Enter the following command to add the user johnyfive to the local administrators group
    net localgroup Administrators johnyfive /add

Note: for other net user commands please see TechNet’s net user page.

How to prevent this hack on your workstations or servers

Here are some steps you can take to better safeguard your workstations and servers from this sort of Windows hack.  I wont go into detail as each of these steps are pretty straightforward.

  • Restrict physical access to the machine
  • Encrypt the system drive
  • Configure a BIOS password

Your email is never published or shared. Required fields are marked *

*

*