I have received a user’s question about how to integrate Kon-Boot into the AIO Boot drive. Fast, tiny and gets your job done! This is the Kon-Boot screen when booting in UEFI mode. Easy to use and excellent for tech repairs, data recovery and security audits.
Without overwriting your old password! In other words you can login to your Windows profile without knowing your password. So i though that unlike BIOS where you can log by pressing likfe F12 or so on that doesnt work like that with UEFI so no one can touch my uefi options if he doesnt know my windows password, but i believe i was wrong witih that guess- if someone has physicall access he can make changes to your UEFI firmware even if he cant log to windows.Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. But it seems that i am wrong because, even that when i start my laptop no boot options appear (like press F2 of antyhing), and i also found no info how to access my UEFI during boot time (before logging to windows), i accidently found a way to access the UEFI before you log into yours Windows, but i wont share it here witht he public since evil people may be watching. It's good to learn these things.Ībout the UEFI thing, i read around that you can access UEFI through your windows account- from advanced Start Up setting, so i though that no one can make changes to your firmware if he cant first log to your windows.
I kinda understand it now, it's not just brute attack program that tries to guess the password from the outside, but it also plays with the windows files themselves, and if encryption is present it won't be able to recover anything, and it wont work. Then even if someone manages to boot (because you can not only boot from USB, but also from CD/DVD and network), they can not read the disk (preventing attacks like Ophcrack) but also not change the files (preventing attacks with password-reset disks).
Preventing booting is one solution that you identified seeing the questions that you ask, but another solution is to prevent file reading by using full disk encryption. Tools like Ophcrack use the following technique: they recover the encrypted passwords from the Windows files that contain them, and then they try to crack the encrypted passwords (by trying out a huge amount of potential passwords).Ī good way to protect yourself from these tools, is to make sure that they can not read the required Windows files from disk. Last time I used the Ophcrack Live CD it did not boot on UEFI, and I just checked the authors page and there is no mention of a new release with UEFI support. To try to break out of this endless loop, you should try to understand how these tools work, and what protection mechanisms Windows offers. This process can go on without ever ending, there are just too many hacking tools out there. No need to apologize, you can ask as many questions as you want.īut you seem to be discovering a lot of hacking tools on the Internet, and then you have questions about that specific tool you just discovered.