Kon Boot is an application which will bypass the authentication process of a Windows logon. Kon Boot can work on either a USB flash drive, CD-ROM, or floppy diskette.
How to use
Using Kon Boot is simple. First load it to your desired media (CD, USB flash, or floppy diskette) then insert it into the target computer, and start it up!
The password is not required to logon to Windows, nor is it overwritten. Simply plugin Kon Boot and let it do the rest.
A common scenario encountered by most computer users is lost or forgotten passwords. In other cases, such as in forensics, it is necessary to have a running version of the operating environment, and not just a raw listing of files.
Kon Boot is designed to be an administrative tool for skilled and non skilled users alike. It works with both computers and virtual machines
What does Kon Boot do?
Kon Boot will allow a user to bypass the authentication process on Windows based systems. The password is not overwritten or modified, it is bypassed.
How does Kon Boot work?
Kon Boot will hook the BIOS during startup. Once Kon Boot has loaded itself to memory, it will modify the Windows OS kernel so that login authentication is not required.
Are there any permanent changes to my computer when I use Kon Boot?
All changes made to the operating system are temporary and will be restored when the computer is rebooted. No permanent changes are made.
My antivirus detects Kon Boot as a virus, does Kon Boot contain malicious code?
No. Due to the behavior of Kon Boot with the computers BIOS, Kon Boot may be incorrectly flagged as a boot virus. However, Kon Boot does not contain any malicious code or virus replication features, nor does it collect any information. The sole instruction of Kon Boot is to modify the Windows kernel so that it may bypass login authentication for the purpose of disaster recovery, auditing, forgotton passwords, or penetration testing. We do suggest disabling your antivirus when creating a Kon Boot CD, Floppy, or USB flash drive.
Does Kon Boot work on domain controllers?
Kon Boot will not bypass authentication of domain controllers. There are instances where a client computer will locally cache a domain login, and Kon Boot may work.
Can Kon Boot bypass hard drive encryption?
No. Kon Boot will only bypass authentication of Windows based local passwords