BitLocker

How does one get back into a computer running windows 10 without admin credentials or a BitLocker recovery key?

Attached: 20190123_172116.jpg (4032x3024, 2.94M)

Other urls found in this thread:

elcomsoft.com/products.html
blog.elcomsoft.com/
twitter.com/SFWRedditGifs

Give it back Tyrone

you don’t

Return the object in question to its rightful owner, Jamal

Not possible at all, eh?

My gf had this issue
There's an option to wipe the computer clean from the login menu (where you're at)

give it back de'shawn

Been trying to do that, but I keep getting blocked by the machine asking for the bitlocker key

That's the whole point of BitLocker.

Format C: drive from a live USB.

>boot system rescue cd
>mkdir windows
>mount /dev/sda2 windows
>???
>profit

Call M$ tech support. They can unlock it for you.

Give it back Tyrone

>he can't install windows

Hirens boot usb

I am the rightful owner

BitLocker means it's encrypted, that would be useless

Ok I got the key but it's not letting me in.

Attached: Senpai.jpg (361x370, 19K)

then you don't have the key. if you are stuck in a loop you need to reset the TPM.

NTFS signature is missing.
Failed to mount '/dev/sda2': Invalid argument
The device '/dev/sda2' doesn't seem to have a valid NTFS.
Maybe the wrong device is used? Or the whole disk instead of a
partition (e.g. /dev/sda, not /dev/sda1)? Or the other way around?
As per usual, the advice of the Linux Youth is completely useless.

Than the volume is either corrupted or encrypted and there's nothing you can do.

>not knowing about hirens boot CD to change all passwords
KYS

>bitlocker
>not having credentials
>not looking up how Bitlocker works

Are you mentally retarded?

Yes.

Attached: alex tin.jpg (300x168, 13K)

>not knowing what bitlocker is

congratulations on mounting an encrypted volume

>not knowing what bitlocker is

Attached: 49829585_1867387566692231_6825506157868613632_n.jpg (400x201, 14K)

Exactly user, exactly.

Turn it off and back on

Welcome to tardville, natural habitat of the common freetard.

elcomsoft.com/products.html
find the one you need and pirate it
micro$oft is a fucking joke

Return it, Jamal

YOU DON'T SAY

I did it! It's running like brand new! Thanks for the help, techfags.

How the fuck could they break encryption with that? It would literally take a million years to brute force my password

>*tries to mount an invalid filesystem
>MAN FUCK LINUX

Np
Now kys

>implying that GNU/Linux users dont know what full disk encryption is

welcome to non-free, backdoor-ridden software.

basically, nothing is secure unless you can see the source code, and even then

Ok but how does that software break the encryption? Let's say all they have is the drive

Is your reflection deceptive or are you a fat fuck?

a lot of backdoors as user said, you can check their blog for disclosures
blog.elcomsoft.com/