Question:
Hi I have a windows xp with no administrator password how do I log in from the internet?
anonymous
1970-01-01 00:00:00 UTC
Hi I have a windows xp with no administrator password how do I log in from the internet?
Six answers:
?
2016-05-18 06:17:17 UTC
1. With your Windows XP CD in the cd-rom drive and boot your computer 2. Press any key when you read "Press any key to boot from cd" on the screen 3. The first screen will indicate that Setup is inspecting the system hardware and loading files 4. When you get to the Welcome screen, press ENTER to Setup Windows now 5. Press F8 to accept the Licensing Agreement 6. The next screen gives you the option to start a Repair process. Use the arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process 7. Setup will now check your disks and then start copying files which can take several minutes. Shortly after this stage you will be required to reboot 8. During the reboot do not press any key to boot from the CD again. Setup will resume automatically with the standard screen 10. Keep your eye on the lower left hand side of the screen. When you see the Installing Devices progress bar, press SHIFT + F10. A command console will now open up giving you a wide access to the system 11. At the prompt, type NUSRMGR.CPL and press Enter. You have gained graphical access to your User Accounts in the Control Panel 12. Now remove or change your password as you prefer. Once the Repair is done, you will be able to log on with your new password. Your programs and personalized settings should remain intact. Now that your logon problem is fixed, you should prevent this problem from happening again by creating a Password Reset Disk. This is a floppy disk you can use in the event you forget your password. It allows you to set a new password.
Eli
2015-09-24 01:18:30 UTC
100% Reset Windows Admin Password - http://tinyurl.com/dsSD54hG
Sedi_Eng
2007-04-29 01:52:09 UTC
Hi,

Try logmein application it is very easy, clear and free

www.logmein.com
Gaby
2007-04-25 03:51:03 UTC
Do you mean u want to try to log onto ur computer remotely? Example from office? If so, there are many software out there which allows u to do that. I tired VNC (Which is free), PCAnywhere, RemoteView or even Remote Connection ...maybe u can do a search for these software...might help.
anonymous
2007-04-25 03:33:44 UTC
you just click on the internet ex sign (i have Firefox much better)



what do you mean log in from the internetr?
_Chetu_
2007-04-26 02:22:31 UTC
Beer,

thr is 100 way to hack xp admin's pass.

thr is lot of way to hack your syste !!! i cant tell or tech u here abt dat.





here is little example :



NetBIOS stands for Network Basic Input Output System .It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. If you have experience of working on a LAN using Microsoft Windows Operating Systems (like Windows98 , Windows Me, Windows NT etc), you must have clicked on "Network Neighborhood" to access the computers attached to your network. After clicking on the icon you would have seen the names of the computer . Do you know what exactly happens when you click on Network Neighborhood? Your computer tries to get the names of the computers attached to the network with by issuing command to NetBIOS . NetBIOS gives the name of the computers that have been registered . In short NetBIOS gives the various information of the computers on a network . These Include-



Name of the computer



Username



Domain



Computer Name



and many others.



Like any other service it also works on a port . It has been assigned a port number 139.



********



THE NBTSTAT COMMAND



You can manually interact with the NetBIOS with the help of NBTSTAT command. To use this command click on the start button then select RUN... and type "command" without quotes to launch MS-DOS Command Prompt. Alternatively you may click on Start Button then go to Programs and then select Command Prompt. Once you are in Command Prompt you can exit by typing command EXIT . To launch Command Prompt in full screen mode press ALT+ENTER key combination .To get back to the original window again press ALT+ENTER key combination. If you have launched the command prompt you will get



c:\windows>



If you do not get windows displayed after c:\ don't worry just keep going , all required commands will work fine.



Now lets play with the NBTSTAT command.



If you want to get more help from MS-DOS about this command type NBTSTAT/? on the prompt i.e.



c:\windows>nbtstat/?



If you want to get the NetBIOS information of your computer type the following command



c:\windows>nbtstat -a 127.0.0.1



This command will list the NetBIOS information. A typical example



NetBIOS Remote Machine Name Table



Name Number Type Usage



*****



==========================================================================



workgroup 00 G Domain Name



my_computer 03 U Messenger Service



myusername 03 U Messenger Service





MAC Address = 00-02-44-14-23-E6







Please note that we have used our ip address to be 127.0.0.1 . This ip address is called as "Loop Back" ip address because this ip address always refers to the computer you are using.



This example is self explanatory . We need not go in details. We need to know about the Name and Number. The Name displays the Name of the NetBIOS and there is a corresponding hexagonal number . You may see some additional names in your case.



If you want to get the NetBIOS names of a remote computer, the command is



c:\windows>nbtstat -a ipaddress



Example - To get the NetBIOS names of a computer having ip address 203.195.136.156, we shall use the command



NOTE-203.195.136.156 may be a active ip address of someone's computer. I am using it only as an example. Please don't hack this computer.



c:\windows>nbtstat -a 203.195.136.156



If you want to get to know more about the ip address and ports click here



YPES OF ATTACKS



We can launch two types of attack on the remote computer having NetBIOS.



1. Reading/Writing to a remote computer system



2. Denial of Service



Lets Hack -Part 1 Remotely reading/writing to a victim's computer



Believe it or not but NetBIOS is the easiest method to break into somebody's computer. However there is a condition that must be satisfied before you can hack. The condition is that the victim must have enabled File And Printer Sharing on his computer. If the victim has enabled it , the nbtstat command will display one more NetBIOS name. Now lets us take a example. Suppose you know a ip address that has enabled File And Printer Sharing and let suppose the ip address happens to be 203.195.136.156 .



If you would like to know more about ip address click here . If you don't the ip address where File and Printer Sharing is enabled read "Searching for a victim"



The command that you will use to view the NetBIOS name is



c:\windows>nbtstat -a 203.195.136.156



Let suppose that the output comes out to be



NetBIOS Remote Machine Name Table



Name Type Status

-------------------------------------------------------------------------------------------------

user <00> UNIQUE Registered

workgroup <00> GROUP Registered

user <03> UNIQUE Registered

user <20> UNIQUE Registered





MAC Address = 00-02-44-14-23-E6







The number <20> shows that the victim has enabled the File And Printer Sharing.



-------------------------------------------------------------------------------------------------------------------------------------------------------------



NOTE - If you do not get this number there are two possibilities



1. You do not get the number <20> . This shows that the victim has not enabled the File And Printer Sharing .



2. You get "Host Not found" . This shows that the port 139 is closed or the ip address doesn't exists.



---------------------------------------------------------------------------------------------------------



Now our next step would be to view the drive or folders the victim is sharing.



We will use command



c:\windows>net view \\203.195.136.156



Let suppose we get the following output



Shared resources at \\203.195.136.156

ComputerNameGoesHere



Share name Type Used as Comment



-----------------------------------------------------------------------------------------------

CDISK Disk





The command completed successfully.







"DISK" shows that the victim is sharing a Disk named as CDISK . You may also get some additional information like







Shared resources at \\203.195.136.156





ComputerNameGoesHere



Share name Type Used as Comment



-----------------------------------------------------------------------------------------------

HP-6L Print





"Print " shows that the victim is sharing a printer named as HP-6L



If we are able to share the victims hard disks or folders or printers we will be able to read write to the folders or hard disks or we may also be able to print anything on a remote printer ! Now let us share the victims computer's hard disk or printer.



Till now we know that there is a computer whose ip address happens to be 203.195.136.156 and on that computer File and printer sharing is enabled and the victim's hard disk 's name is CDISK.



Now we will connect our computer to that hard disk . After we have connected successfully a drive will be created on our computer and on double clicking on it we will be able to view the contents of the drive. If we have connected our newly formed drive to the victim's share name CDISK it means that we our drive will have the same contents as that of the CDISK .



Lets do it.



We will use the NET command to do our work .



Let suppose we want to make a drive k: on our computer and connect it to victim's share we will issue the command



c:\windows>net use k: \\203.195.136.156\CDISK



You may replace k letter by any other letter.



If the command is successful we will get the confirmation - The command was completed successfullly



The command was completed successfully



Now just double click on the My Computer icon on your desktop and you will be a happy hacker!



We have just crested a new drive k: . Just double click on it and you will find that you are able to access the remote computer's hard disk. Enjoy your first hack!



GO TO CONTENTS



____________________________________________



Cracking Share passwords



Sometimes when we use "net use k: \\ipaddress\sharename" we are asked for a password. There is a password cracker "PQWAK" . All you have to enter ip address and the share name and it will decrypt the password within seconds. Please note that this can crack only the passwords is the remote operating system is running on -



Windows 95



Windows 98



Windows Me



GO TO CONTENTS



_____________________________________________



Using IPC$ to hack Windows NT,2000,XP



Now you must be thinking of something that can crack share passwords on NT based operating systems like Windows NT and Windows 2000.



IPC$ is there to help us. It is not at all a password cracker . It is simply a string that tells the remote operating system to give guest access that is give access without asking for password.



We hackers use IPC$ in this way



c:\windows>net use k: \\123.123.123.123\ipc$ "" /user:""



You may replace k letter by any other letter. If you replace it by "b" (type without quotes) a new drive will be created by a drive letter b.



Please note that you won't be able to get access to victim's shared drives but you you can gather valuable information like names of all the usernames, users that have never logged, and other such information. One such tool that uses the ipc$ method is "Internet Periscope". Another tool is "enum" - its my favorite toot however it is run on command promt.



GO TO CONTENTS



_____________________________________________





Penetrating in to the victim's computer



Now that you have access to a remote computer you may be interested in viewing his secret emails, download hismp3 songs , and more...



But if you think like a hard core hacker you would like to play some dirty tricks like you may wish to install a key logger or install a back door entry Trojan like netbus and backorifice or delete or copy some files. All these tasks involves writing to victim's hard disk . For this you need to have write access permission.



GO TO CONTENTS



____________________________________________



Lets Hack - Part 2 Denial of service attack





This type of attacks are meant to be launched by some computer techies because this type of attack involves using Linux Operating System and compiling C language files. To exploit these vulnerabilities you have to copy exploit code from sites like neworder,securityfocus etc and comiple them.



The two most common vulnerabilities found in NetBIOS are



Vulnerability 1



Vulnerability 2



Another vulnerability that has been foud recently is that one can launch a DoS attack against winodws NT,2000,XP,.NET system. For detailed information and pacth plz visit this link http://www.microsoft.com/technet/treeview/...in/MS02-045.asp.

I have checked my web servers that are still vulnerable to this type of attack.









*** and there is lot of way only few people knw dat ;)

i hope u enjoyed, take care


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...