none
Lost password for server

    Question

  • As administrators to a company that has gone into liquidation we are trying to access their Small Business Server 2003.  We have been unable to obtain the server user & password.

    Initially we just want to power the server off properly to move it, and then bring it back up again in a new location.

    Any suggestions.  The risk is that the power cord is just going to be pulled which is not the best solution.

    Thanks

    Friday, June 15, 2012 12:43 AM

Answers

  • There are a number of "utilities" on the web that will enable you to discover the passwords, but they are best used from a boot CD, not while the system is active.  If you cannot find the admin name and address, don't pull the plug, but instead hold down the power button.  Then before starting it again, read this, among others:

    http://www.petri.co.il/forgot_administrator_password.htm


    Larry Struckmeyer[SBS-MVP]

    Friday, June 15, 2012 12:56 AM
  • Rick, that's completetely useless in such 'hostile takeover' situation.

    It's a 2 step process(on SBS03):

    You must 1st gain access to the 'local admin' account (DSRM admin). Various 'local account password crack' boot CDs can be used to get this. I prefer Peter Nordhals.

    In DSRM mode you then implement a service that allows, and performs, the Domain Administrator (on SBS03 normally the '500' account) password change.

    Windows 2000 was easier, and so is Windows 2008. You can 'crack' both _without_ going into DSRM. (2003 disabled the screensaver/loginscreen hack, but MS brought it back for 08)

    If you have physical access to the box _it's your box_. 'remote' cracking is a _little_ harder.

    no 'password reset' floppy required.

    Monday, June 18, 2012 6:11 AM

All replies

  • There are a number of "utilities" on the web that will enable you to discover the passwords, but they are best used from a boot CD, not while the system is active.  If you cannot find the admin name and address, don't pull the plug, but instead hold down the power button.  Then before starting it again, read this, among others:

    http://www.petri.co.il/forgot_administrator_password.htm


    Larry Struckmeyer[SBS-MVP]

    Friday, June 15, 2012 12:56 AM
  • Hi,

    Thank you for the post.

    Agree with Larry's suggestion. Microsoft just provide system password disk to reset password, but the disk must be created before the password lost. Here is Microsoft policy about lost or forgotten passwords KB.
    http://support.microsoft.com/kb/189126

    If there are more inquiries on this issue, please feel free to let us know.
     
    Regards


    Rick Tan

    TechNet Community Support

    Monday, June 18, 2012 2:56 AM
  • Rick, that's completetely useless in such 'hostile takeover' situation.

    It's a 2 step process(on SBS03):

    You must 1st gain access to the 'local admin' account (DSRM admin). Various 'local account password crack' boot CDs can be used to get this. I prefer Peter Nordhals.

    In DSRM mode you then implement a service that allows, and performs, the Domain Administrator (on SBS03 normally the '500' account) password change.

    Windows 2000 was easier, and so is Windows 2008. You can 'crack' both _without_ going into DSRM. (2003 disabled the screensaver/loginscreen hack, but MS brought it back for 08)

    If you have physical access to the box _it's your box_. 'remote' cracking is a _little_ harder.

    no 'password reset' floppy required.

    Monday, June 18, 2012 6:11 AM
  • More than 1 year later... my two bits for your problem. Maybe will help anyone in a future search for the same problem.

    Password recovery of any Windows is done with the Windows original CD, and booting from the CD/DVD. If you can boot the server, I will reset any password.

    This is for native Windows. For VM's, there is another 100% safe hack that you can use, with (again) Microsoft tools only.

    DON'T ever use cd recovery for admins or stuff like that, when Microsoft gives you all tools you need.


    Adelino Araujo

    Saturday, January 11, 2014 12:11 PM