In this video, I will be demonstrating how to bypass Windows authentication with Kon-Boot. Kon-Boot (aka kon boot, konboot) is a tool that allows accessing the target computer without knowing the user’s password. Unlike other solutions Kon-Boot does not reset or modify the user’s password and all changes are reverted back to the previous state after the system restarts. It has been on the market since 2009 and the free version was downloaded more than 5 000 000 times.
Kon-Boot:
📈 SUPPORT US:
Patreon:
Merchandise:
SOCIAL NETWORKS:
Reddit:
Twitter:
Instagram:
LinkedIn:
WHERE YOU CAN FIND US ONLINE:
Blog:
HackerSploit Forum:
HackerSploit Cybersecurity Services:
HackerSploit Academy:
HackerSploit Discord:
LISTEN TO THE CYBERTALK PODCAST:
Spotify:
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d’avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#Kon-Boot#Windows
Nguồn: https://romebydiamondlotusq2.com/
Xem thêm bài viết khác: https://romebydiamondlotusq2.com/tong-hop/
Xem thêm Bài Viết:
- Kinh nghiệm xương máu cho người muốn thuê phòng trọ sinh viên
- Mách bạn cách tải Đột Kích siêu nhanh khám phá game tuyệt đỉnh
- Alps pointing driver là gì? Thông tin cần biết về alps pointing driver ra sao?
- Cập nhập chi tiết cách boot từ usb main gigabyte h61 mà bạn không nên bỏ lỡ
- Chế máy lạnh bằng thùng xốp đơn giản giúp giải nhiệt hiệu quả
Hiren's Boot is free
If you don't want to spend the 75€, I am reselling my professional licence for 7€ ONLY. Save 68€ TODAY if you want.
http://getkonboot.fetchapp.com/sell/7cb6f771
Hirens will also do this
@HackerSploit, if there is an HDD password set for D: Drive (non-OS drive) using the UEFI Boot menu, is there any way to bypass the password protection? I am NOT concerned with the BitLocker settings. I already have the BitLocker recovery code. Is there a way to bypass the HDD password? I forgot the password and the drive remains inaccessible and it does neither show up in File Explorer nor under Disk Management. Is there any way out?
You can Secure Boot to KonBoot too.
https://rmprepusb.blogspot.com/2020/04/how-to-uefi64-secure-boot-to-konboot.html
yeah you can get this software by other means
I wanna ask you if there is a link to get this tool for free
The more i learn about penetration testing the cooler it gets
Maybe not the fastest way but i use free distro Hirens which have tool to edit password in sam file.
But those tools don't help you much if bitlocker is on
If this is an old and known tool, how can it happen that Microsoft did not fix it's product against it?
Does it work on encrypted (Bitlocker) drives?
And also not working inwin 10
It won't work on when bios locked
Yes I want you to make a video on how it works thank youuu
Whats a good python library to brute force RDP with NLA enabled? Just check for credentials.
What are your PC or Laptop specs?
this is cool if win 10 has BitLocker on then how i bypass
Please make video on your computer..What is the cost of this!!
Please guide
Awesome video as usual. I remember writing an article on how to do this back in 2013, but using Offline NT Password & Registry Editor, as I was amazed that I could do it.
However, Kon-Boot seems a hell of a lot easier as it automated far more. Before that though, I just used to boot to a Linux Live USB/CD and copy the files over that way due to Linux ignoring the NTFS security (no need to Take Ownership etc)
Also, have only just recently found your channel and loving all the article and videos regarding the CEH and your walkthroughs. Love that you explain the terminology in an easy to understand way. Great grounding for people getting in to the Security Field.
can Kon-boot also bypassing domain accounts? in this example you're bypassing .Administrator or .Alexis but how about bypassing a local cached user account MYDOMalice or alice@mydom.intra.local ? is Ken-boot capable of this?
No Bitlocker (preferably TPM+PIN), No sympathy! ….. You deserve it 🤣
Bro…plz make a video on darkweb links..and hackers groups Websites in dark web…🙏🙏🙏
Please add Indonesian subtitle
This kids is why you use Bitlocker.
If the people forgot windows password and really want the files just use Linux live usb.
#1 mentor
Thx so much my bro for your effort and ur videos keep going, honestly i have downloaded about 250 of your videos and I’m still downloading.. thanks too much
There's even MULTIPLE websites that advertise konboot but you have to purchase it? AND IT'S A EXE file. Nice try hackersploit
Guys don't follow the link. I tried a purchase as a test and it's a trojan. They even ask that you disable your firewall. It's one giant scam lmao
Im still waiting for a tutorial on scrambled eggs
Thank you…. the best channel to learn
Yeah man. The more details we get the better!! N hey as a side note… ur channel is getting big enough that you could start reaching out for sponsorships… so the more videos you do the more money…
Wow I used to use kon boot like 8 yrs ago. Haha. It's so funny to see it again. I thought id never see that again, lol.
Hi my doubt is that, will it work when BIOS boot password is set?……Please check…
I have Windows authentication app from TPB.
This still works!?!?!? I using this years ago.
so what are the best programming languages for hacking
any suggestions
Whats the difference between this and say pc unlocker tool?
Would this work on an encrypted drive ?
Very good vidéo, i'm from Congo Brazzaville in Africa
My other fave is CHNTPW. Again, doesn't work on Encrypted partitions, and should "Blank" a Win 10 PW. Works on Servers as well. I believe it's in Kali, and you can install it as a package in other linux distros. http://pogostick.net/~pnh/ntpasswd/
Also seems that NOTHING i can find will work on an Encrypted partition ( Yet ) ……so head that way if you don't want to be bypassed.