- AccessChk: View effective permissions on files and folders - Thu, Apr 13 2023
- Read NTFS permissions: View read, write, and deny access information with AccessEnum - Wed, Mar 29 2023
- Kill Windows a process with Tskill and Taskkill - Mon, Mar 13 2023
For years, it has been possible to use a simple hack to gain access to a Windows machine using built-in tools, such as Utilman.exe, Sethc.exe, or DisplaySwitch.exe. Last year, Microsoft took a step forward and started to block these with Windows Defender. However, as described in Reset Windows 10 password by disabling Windows Defender, it is still very easy to overcome this hurdle just by booting into Safe mode. As Microsoft released a new version of its server operating system, Windows Server 2022, as well as Windows 11 in Insider Preview, we wanted to see if this is still possible.
Reset Windows 11 password
To start with the procedure, you need to boot up with something that can access the NTFS file system. In my case, I always use Windows installation media or Windows PE media.
After booting, press Shift+F10 to access the command prompt. If the computer is BitLocker encrypted, click Next and choose Repair your computer, which will allow you to enter the BitLocker recovery key and move forward.
Once you have access to the command prompt, you need to change the directory to the Windows\System32 folder. In previous versions (Windows 10 and older), the system drive was usually accessible under the C: or D: drive. Well, it seems that Microsoft wants to make your hacking life a bit harder, and the drive letter is no longer assigned to the system partition by default. Luckily, you can access the Diskpart tool and assign it yourself.
To do so, start Diskpart and use the list volume command. This will show you all available volumes on the drive. In my case, I know the system is installed on Volume 1, which is the only NTFS partition with enough capacity. Usually, Windows is installed on the first available NTFS partition. At this point, use the select volume 1 command followed by the assign command to get a drive letter assigned.
Exit Diskpart and move forward by changing the directory to C:\Windows\System32 and backing up the executable file you are going to replace. My favorite one is Utilman.exe, but the procedure can also be accomplished with Sethc.exe or DisplaySwitch.exe.
Run the copy Utilman.exe .. command to copy Utilman.exe to the C:\Windows folder.
Next, run copy cmd.exe Utilman.exe to replace the executable with a command prompt.
At this point, you are ready to exit the setup and boot up the operating system. As we already know from previous experience, Safe mode is required to perform the action. To get into Safe mode, press Restart while holding the Shift key.
Once booted in the troubleshooting splash screen, click Troubleshoot > Advanced Options > Startup Settings > Restart. Select option number 4 to boot into Safe mode.
After you get to the logon screen, click the Accessibility icon to get the command prompt started.
Now you have a command prompt running under the NT AUTHORITY\SYSTEM account, which allows you to perform various actions. Let's reset our admin account password by using the NET USER admin Passw0rd command. You can also create a new user account and add it to the Administrators group, or open the Management Console (type mmc) and access the Computer Management snap-in.
That's it! Now you can close the command prompt and log on to the system with administrative permissions.
To get the system to a clean state, you need to restore the original Utilman.exe. This can be done from an elevated command prompt using the Robocopy C:\Windows C:\Windows\System32 Utilman.exe /B command. As you can see, the Windows 11 taskbar is somehow empty in Safe mode and can't be used to launch anything (yes, we are in the Inside Preview version, but it's quite funny that such a basic thing is not working properly here). To overcome this, simply press the Windows+R keys and type cmd in the Run window, which will launch an elevated command prompt.
Done! All that's left is to reboot the computer to Normal mode.
Reset Windows Server 2022 password
The same procedure can be applied to Windows Server 2022 (with GUI only) with just one change. The Windows Server logon screen does not allow you to reboot the system, so it's not possible to get into Safe mode with the Shift+Restart combination. In this case, simply reset the system while booting, which will get you into the troubleshooting splash screen. Then follow the steps to get into Safe mode, as described earlier in the post. Once booted to Safe mode, click the Accessibility icon, and move forward with the hack.
Subscribe to 4sysops newsletter!
Final words
As you can see, Microsoft is leaving this back door open and is obviously not planning to do anything about it soon. Yes, we could say that once you have physical access to a computer, it's already yours (unless it's BitLocker encrypted); but the system vendor, in this case Microsoft, should not make it so easy to reset a Windows password.
Did someone found a way to use this kind of trick on a Windows Server Core edition? As osk.exe and utilman.exe doesn’t exist on that kind of editions.