Home > Products > Windows Passwords > Reset Windows Password > Screenshots > Dump password hashes to text file
Dump Windows password hashes to text file
24.06.2019
Reset Windows Password v9.3
Support for Windows 10 1903, Trusted Boot Auto-Logon, Microsoft Edge Dev ...
11.06.2019
New article
DPAPI security flaw in Windows 10
10.06.2019
Windows Password Recovery 11.7
Support for Windows 10 1903, Trusted Boot Auto-Logon, etc.
24.05.2019
Wireless Password Recovery v6.0.1
New GPU engine and automated multi-mode for recovery

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Reset Windows Password:
dump (export) password hashes to a text file

 

Selecting data source

Selecting SAM/NTDS.DIT and SYSTEM files

On this step, specify the location of SAM and SYSTEM files. Or, in the case with domain users, - ntds.dit and SYSTEM.


 

Dump password hashes

Dump LM / NTLM password hashes

Select the format and type of the export file. While generating the dump, you can also delete, if that's no value to you, individual unnecessary attributes of the account. If the Passcape format is selected, you can also dump plaintext passwords (if ones were found). The application scans your computer for the availability of such and, if such are available, maps them to the accounts while saving to the dump file.

Plaintext passwords are stored in the domain when the option 'Store passwords using reversible encryption for all users in the domain' is set; you can find it in the group policy console.

Further on, you can use the dump file with different password audit and recovery applications.