How does one get back into a computer running windows 10 without admin credentials or a BitLocker recovery key?
BitLocker
Other urls found in this thread:
elcomsoft.com
blog.elcomsoft.com
twitter.com
Give it back Tyrone
you don’t
Return the object in question to its rightful owner, Jamal
Not possible at all, eh?
My gf had this issue
There's an option to wipe the computer clean from the login menu (where you're at)
give it back de'shawn
Been trying to do that, but I keep getting blocked by the machine asking for the bitlocker key
That's the whole point of BitLocker.
Format C: drive from a live USB.
>boot system rescue cd
>mkdir windows
>mount /dev/sda2 windows
>???
>profit
Call M$ tech support. They can unlock it for you.
Give it back Tyrone
>he can't install windows
Hirens boot usb
I am the rightful owner
BitLocker means it's encrypted, that would be useless
Ok I got the key but it's not letting me in.
then you don't have the key. if you are stuck in a loop you need to reset the TPM.
NTFS signature is missing.
Failed to mount '/dev/sda2': Invalid argument
The device '/dev/sda2' doesn't seem to have a valid NTFS.
Maybe the wrong device is used? Or the whole disk instead of a
partition (e.g. /dev/sda, not /dev/sda1)? Or the other way around?
As per usual, the advice of the Linux Youth is completely useless.
Than the volume is either corrupted or encrypted and there's nothing you can do.
>not knowing about hirens boot CD to change all passwords
KYS
>bitlocker
>not having credentials
>not looking up how Bitlocker works
Are you mentally retarded?
Yes.
>not knowing what bitlocker is
congratulations on mounting an encrypted volume
>not knowing what bitlocker is
Exactly user, exactly.
Turn it off and back on
Welcome to tardville, natural habitat of the common freetard.
elcomsoft.com
find the one you need and pirate it
micro$oft is a fucking joke
Return it, Jamal
YOU DON'T SAY
I did it! It's running like brand new! Thanks for the help, techfags.
How the fuck could they break encryption with that? It would literally take a million years to brute force my password
>*tries to mount an invalid filesystem
>MAN FUCK LINUX
Np
Now kys
>implying that GNU/Linux users dont know what full disk encryption is
welcome to non-free, backdoor-ridden software.
basically, nothing is secure unless you can see the source code, and even then
Ok but how does that software break the encryption? Let's say all they have is the drive
Is your reflection deceptive or are you a fat fuck?
a lot of backdoors as user said, you can check their blog for disclosures
blog.elcomsoft.com