Bypass Windows Authentication With Kon-Boot


In this video, I will be demonstrating how to bypass Windows authentication with Kon-Boot. Kon-Boot (aka kon boot, konboot) is a tool that allows accessing the target computer without knowing the user’s password. Unlike other solutions Kon-Boot does not reset or modify the user’s password and all changes are reverted back to the previous state after the system restarts. It has been on the market since 2009 and the free version was downloaded more than 5 000 000 times.




HackerSploit Forum:
HackerSploit Cybersecurity Services:
HackerSploit Academy:
HackerSploit Discord:


We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
Merci d’avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة



Xem thêm bài viết khác:


  1. If you don't want to spend the 75€, I am reselling my professional licence for 7€ ONLY. Save 68€ TODAY if you want.

  2. @HackerSploit, if there is an HDD password set for D: Drive (non-OS drive) using the UEFI Boot menu, is there any way to bypass the password protection? I am NOT concerned with the BitLocker settings. I already have the BitLocker recovery code. Is there a way to bypass the HDD password? I forgot the password and the drive remains inaccessible and it does neither show up in File Explorer nor under Disk Management. Is there any way out?

  3. You can Secure Boot to KonBoot too.

  4. Maybe not the fastest way but i use free distro Hirens which have tool to edit password in sam file.
    But those tools don't help you much if bitlocker is on

  5. Awesome video as usual. I remember writing an article on how to do this back in 2013, but using Offline NT Password & Registry Editor, as I was amazed that I could do it.

    However, Kon-Boot seems a hell of a lot easier as it automated far more. Before that though, I just used to boot to a Linux Live USB/CD and copy the files over that way due to Linux ignoring the NTFS security (no need to Take Ownership etc)

    Also, have only just recently found your channel and loving all the article and videos regarding the CEH and your walkthroughs. Love that you explain the terminology in an easy to understand way. Great grounding for people getting in to the Security Field.

  6. can Kon-boot also bypassing domain accounts? in this example you're bypassing .Administrator or .Alexis but how about bypassing a local cached user account MYDOMalice or alice@mydom.intra.local ? is Ken-boot capable of this?

  7. Thx so much my bro for your effort and ur videos keep going, honestly i have downloaded about 250 of your videos and I’m still downloading.. thanks too much

  8. There's even MULTIPLE websites that advertise konboot but you have to purchase it? AND IT'S A EXE file. Nice try hackersploit

  9. Guys don't follow the link. I tried a purchase as a test and it's a trojan. They even ask that you disable your firewall. It's one giant scam lmao

  10. Yeah man. The more details we get the better!! N hey as a side note… ur channel is getting big enough that you could start reaching out for sponsorships… so the more videos you do the more money…

  11. Wow I used to use kon boot like 8 yrs ago. Haha. It's so funny to see it again. I thought id never see that again, lol.

  12. My other fave is CHNTPW. Again, doesn't work on Encrypted partitions, and should "Blank" a Win 10 PW. Works on Servers as well. I believe it's in Kali, and you can install it as a package in other linux distros.

    Also seems that NOTHING i can find will work on an Encrypted partition ( Yet ) ……so head that way if you don't want to be bypassed.

  13. Great tool but instead the best free way is fire up kali live and access your windows data… backup and reinstall windows 😀


Please enter your comment!
Please enter your name here