Printer Friendly

Windows Server hacks: creating a password reset disk.

Depending on the machine and user involved, losing a password for an account can be anything from a pain to a disaster. Fortunately, in Windows Server 2003 and Windows XP there's something you can do to prepare for such an eventuality: create a password reset disk.

In Windows Server 2003 you can create a password reset disk for any local user account on a member server (a nondomain controller in a domain) or stand-alone server (a server in a workgroup). You can't create a password reset disk for a domain controller because a domain controller doesn't have any local user accounts, only domain accounts stored in Active Directory.

A typical use for a password reset disk would be to create one for the all-powerful local Administrator account on your server. To do this, get a blank formatted floppy and follow these steps:

1. Press Ctrl-Alt-Del to open the Windows Security dialog box.

2. Click on the Change Password button to open the Change Password box.

3. In the User Name field, type the name of the local user account-for example, Administrator-whose password you want to be able to reset.

4. In the LogOnTo list box select the name of the computer-for example, TEST210 (this computer).

5. The Backup button should now appear at the bottom left of the Change Password box. If it doesn't, backspace inside the User Name field to erase what you typed and type it again.

6. Do not type anything in the Old Password or New Password fields. (You can't change your password and create a reset disk in the same operation.)

7. Click on the Backup button to start the Forgotten Password wizard.

8. Click Next, insert your floppy, and click Next.

9. Type the current password of the account for which you are creating a reset disk and click Next.

10. When the wizard is fished, click Next and then Finish.

11. Click Cancel twice to close the Windows Security screen and return to your desktop.

Put your password reset disk in a secure location-especially if you created it for the local Administrator account on your server, because anyone who gets hold of your reset disk can log on to the machine and have unlimited access.

What if you lose your password and you need to log on to your machine? That may sound unlikely, but what if the administrator who installed the server is sick or out of the office and you can't remember the password? Simply dig out your password reset disk (hopefully you know where to find it) and do the following:

1. Take a random guess what the password might be. If you're right, you're in; if not, a Login Failed dialog box will appear, which is what you want to get to.

2. Click on the Reset button to start the Password Reset wizard.

3. Click Next, insert your password reset disk, and click Next again.

4. Type a new password for the account and, if desired, a hint as well. (Hints are probably not a good idea for Administrator accounts.)

How It Works

Running the Forgotten Password wizard creates a public/private key pair for the local user account you specified in the Change Password box. The private key is then stored on the reset disk while the public key is stored on the hard drive and used to encrypt the current password for your user account. Then, if you later have to run the Reset Password wizard, the private key on your floppy is used to decrypt the account's current password, and when you enter a new password for the account, this new password is encrypted using the same public key. This means you can use the same password reset disk to reset the password for your account as many times as you need to. It also means the password reset disk itself can't be hacked to extract the account's password, as it contains only a cryptographic key rather than the password itself.

What Can Go Wrong

A few things can go wrong when you use password reset disks. First and most obvious, if you run the Forgotten Password wizard a second time to create a new password reset disk, this generates a new public/private key pair for the account and invalidates the previous reset disk. So if you're really paranoid and want to create multiple reset disks, run the wizard only once, then make duplicates of the reset disk and store them in different secure locations.

More subtly, I encountered an interesting problem the first time I tried this approach for recovering the local Administrator password on a Windows Server 2003 member server. I created a password reset disk using the procedure described above and then tried to use it to reset the account password as outlined. But when I specified a new password and clicked Next, a message appeared saying, "The new password is too short or otherwise unusable due to the policy settings for this computer.' Opening the Default Domain

Policy in Group Policy Editor revealed that my Password Policy settings included a minimum password age of two days:

What this policy setting means is that if you change the password for an account, you have to wait an additional two days before you can change it again. Also, I had changed the password for the local Administrator account on the machine just before I created my password reset disk. (I had demoted the machine from the role of domain controller to member server, which always entails speecifying a new password for the local Administrator account.) So I changed the minimum password age policy setting zero days, ran 'gpupdate/force' on the member server, tested the rest disk, then changed the policy setting back again.
COPYRIGHT 2004 A.P. Publications Ltd.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2004, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Windows Practice
Author:Tuhoch, Mitch
Publication:Software World
Geographic Code:1USA
Date:Sep 1, 2004
Previous Article:Integrating Windows and Linux desktops.
Next Article:In-depth profiles and benchmarks of 21 offshore service providers.

Related Articles
Computer network insecurity: how to defend your confidential files.
Your skin gets you in.
Hacker-resistant software launched. (IT Strategies).
Encryption Plus Hard Disk V7.0. (Virus Notes).
PC Guardian and Encryption Plus Hard Disk 7.0 get high ratings from Gartner.
Suspect system incident verification in incident response.
Security Event Log Monitor (S.E.L.M.) 5.
Bluesocket WG-2100: if you're looking to gain control over your wireless LAN segments, this might be the device for you.
O'Reilly & Associates.
Keep on hacking.

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |