Reset Forgotten Windows Password with Linux Rescue CD

Recovering Windows Passwords with System Rescue CD
Previously in this series, we detailed password resetting on Windows utilizing the Ultimate Boot CD. However, for users possessing greater technical proficiency, the System Rescue CD, a Linux-based distribution, presents a viable alternative.
It's important to recognize that employing password reset methods on systems employing standard Windows file encryption will result in permanent inaccessibility to those encrypted files.
In such scenarios, password cracking is the recommended course of action, a topic we will address in a future article.
Password Recovery for Ubuntu Users
For those utilizing Ubuntu and encountering password loss, recovery procedures have already been outlined.
These methods include a straightforward approach via the grub menu, or alternatively, leveraging a live CD environment.
Both techniques offer effective solutions for regaining access to your Ubuntu account.
System Rescue CD provides a powerful toolkit for system administration tasks, including password recovery.
Remember to consider the implications of file encryption before attempting any password reset procedure.
Generating the System Rescue CD
Initially, a copy of the System Rescue CD must be obtained and the ISO image subsequently written to a disc. ImgBurn is my preferred tool for this process, though alternative disc burning applications can be utilized as desired.
Within ImgBurn, select the "Write image file to disc" option to begin.

Locate and select the ISO file by clicking the "File" button adjacent to "Source," and then initiate the burning process by clicking the "Burn" button at the bottom of the window. The procedure is relatively straightforward.

The System Rescue CD can be downloaded from the official website at sysresccd.org.
Password Reset Procedure
Having obtained your bootable CD, the next step involves booting from it. This action will lead you to a prompt containing essential instructions for utilizing the CD effectively.
Initially, the hard drive must be mounted using a specific command. The --o force argument may not always be necessary, but it’s particularly useful when the system experienced an improper shutdown.
ntfs-3g /dev/sda1 /mnt/windows --o force
To confirm successful mounting and verify the correct drive, employ the df --m command. At this stage, the drive will be accessible at the path /mnt/windows.
Navigating to the System Configuration Directory
Subsequently, navigate into the Windows/System32/config directory within your Windows installation. The exact path may vary depending on your system configuration.
cd /mnt/windows/Windows/System32/config
Upon entering this directory, you will locate the SAM file, which is the target for password modification.
Utilizing the chntpw Command
Password alterations are performed using the chntpw command. It is recommended to first list all usernames within the SAM file using the --l argument.
chntpw --l SAM
To modify a specific user's password, use the --u argument followed by the username. Replace "geek" in the example below with your actual username.
chntpw --u geek SAM
This will initiate an interactive, wizard-like interface.
Assuming you intend to establish a new password, enter "2" at the prompt. Input your desired password and confirm the save operation by pressing "y" when prompted.
With the password successfully altered, issue the reboot command to restart the computer. Remember to remove the boot CD before the system restarts.
You should now be able to log in using the newly assigned password.
This method has been successfully tested on Windows XP, Vista, and Windows 7.
Download ImgBurn from Ninite.