{"id":1559,"date":"2018-06-26T08:08:22","date_gmt":"2018-06-26T08:08:22","guid":{"rendered":"https:\/\/www.iseepassword.com\/blog\/?p=1559"},"modified":"2023-10-10T10:50:03","modified_gmt":"2023-10-10T10:50:03","slug":"how-do-i-find-my-windows-usernames-and-passwords","status":"publish","type":"post","link":"https:\/\/www.iseepassword.com\/blog\/how-do-i-find-my-windows-usernames-and-passwords\/","title":{"rendered":"How Do I Find My Windows Usernames and Passwords?"},"content":{"rendered":"<p><span style=\"font-family: arial, helvetica, sans-serif\">Hello guys, today we are going to coin up an essential topic which often triggers your mind while you work on your computer- \u201cHow to Find out your Windows Usernames and Passwords?\u201d<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Precisely saying, finding the username is not that a difficult job as you can clearly see the list of registered usernames on your login screen as well. But to locate the stored passwords of those corresponding usernames is a bit difficult job to accomplish. When you access any particular user account with a system security password, all your Windows credentials get stored at some specific locations which often remains unknown to users in order to protect their details from any abrupt incursion. But being a user you might need to know the locations so as to keep a track of your Windows credentials. And this is what you are going to explore below in this article. How? Let\u2019s check out in the process.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Also read: <a href=\"https:\/\/www.iseepassword.com\/forgot-windows-7-password.html\">3 ways to recover your forgotten Windows 7 password<\/a><\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif\">Method 1. Find My Windows Usernames and Password in Regedit<\/span><\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Have you heard of Control Panel ever? If you have, then this is where we are going to peep in first to find out \u201cStored usernames and Passwords\u201d. As for the first step, press \u201cWindows + R\u201d and small dialogue box of \u201cRun\u201d utility will instantly appear at the bottom left corner of your desktop screen. Next; type in \u201ccmd\u201d to open your command prompt black dialogue box. Once the black dialogue box turns up, enter the following command line and hit \u201cEnter\u201d:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong><em><b><i>rundll32.exe keymgr.dll,KRShowKeyMgr<\/i><\/b><\/em><\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">This will automatically open up the credentials manager of your Control Panel directly where the usernames and passwords of your PC are stored. All you already registered usernames and passwords will be displayed on the new operating windows labeled as \u201cStored User names and Passwords\u201d. In fact this short en-route saves you the trouble of navigating through endless options of Control Panel to get to this location.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1560\" style=\"font-family: arial, helvetica, sans-serif\" src=\"https:\/\/www.iseepassword.com\/blog\/wp-content\/uploads\/2018\/06\/find_name_password.jpg\" alt=\"find name and password\" width=\"654\" height=\"326\" \/><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">In case you fin<\/span><span style=\"font-family: arial, helvetica, sans-serif\">d it too difficult, don&#8217;t panic. There are several other ways which can be employed in order to find out your username and password. \u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">You can also check out the name of the user account you are currently logged on with by a simple command line in &#8220;cmd&#8221; as well. So you again need to open up your command prompt dialogue box as mentioned before and type in &#8220;whoami&#8221; command and press &#8220;Enter&#8221;. Instantaneously your current user account will be shown under the command line.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1561 aligncenter\" src=\"https:\/\/www.iseepassword.com\/blog\/wp-content\/uploads\/2018\/06\/munna_img.jpg\" alt=\"find windows username and password\" width=\"682\" height=\"199\" \/><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Next, we have got to find out the password of the singed-in user account using Registry Editor. This is another powerful workaround platform similar to that of Control Panel, where you can alter various system configurations by manipulating the registry keys stored here. So, how to get there? Well type in \u201cregedit\u201d in the \u201cRun\u201d search box and hit \u201cEnter\u201d. It will open up your system Registry Editor Windows. Once you are in, track the following pathway down:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong><em><b><i>HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon<\/i><\/b><\/em><\/strong><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1562 alignnone\" src=\"https:\/\/www.iseepassword.com\/blog\/wp-content\/uploads\/2018\/06\/locate_name_password.jpg\" alt=\"check your name and password\" width=\"655\" height=\"302\" \/><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">The moment you enter the \u201cWinlogon\u201d sub-key, try to locate the \u201cDefaultPassword\u201d registry key from the list of sub-keys listed on the right hand side pane of \u201cWinlogon\u201d folder. Double click on \u201cDefaultPassword\u201d key and a little pop-up window abruptly turns up. In the \u201cValue Data\u201d field, you will get to see your current user account\u2019s password. You can save it somewhere for future use. <\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Don&#8217;t miss: <a href=\"https:\/\/www.iseepassword.com\/how-to-bypass-windows-7-password.html\">You also bypass the Windows password without losing data<\/a>.<\/span><\/p>\n<h3><\/h3>\n<h3><strong>Method 2. Find My Windows Usernames and Password with John The Ripper<\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">If you find these methods a bit fanatical to your potential, then there is another substitute for them and that involves the usage of software, known as <a href=\"https:\/\/www.iseepassword.com\/alternative-to-john-the-ripper.html\"><strong><em><b><i>John The Ripper<\/i><\/b><\/em><\/strong><\/a>. Here it would be used in conjunction with <strong><em><b><i>Pwdump3<\/i><\/b><\/em><\/strong>\u00a0software. Basically Pwdump3 enables the user to fetch the password hashes from the SAM directory whereas John the Ripper cracks the forgotten password. So initially, set up a new directory at the root drive that is C:\/ and download a decompression file, like WinRAR, 7-ZIP, etc. Now one by one download both the softwares and extract the files contained within them to newly generated password directory and install them with technical caution. Type in the command<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;color: #008000\"><strong><em><b><i>c:passwordspwdump3 &gt; cracked.txt<\/i><\/b><\/em><\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">to launch Pwdump3 and relocate its output to another file called, \u201ccracked.txt\u201d.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1563 aligncenter\" src=\"https:\/\/www.iseepassword.com\/blog\/wp-content\/uploads\/2018\/06\/find_password_now.jpg\" alt=\" John The Ripper\" width=\"579\" height=\"179\" \/><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Now enter the following command to launch the John the Ripper tool:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;color: #008000\"><strong><em><b><i>c:passwordsjohn cracked.txt<\/i><\/b><\/em><\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">The procedure will take few moments before the forgotten password is recovered. As soon as the forgotten password is recovered, it will instantly be shown on the interface screen.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1564\" src=\"https:\/\/www.iseepassword.com\/blog\/wp-content\/uploads\/2018\/06\/find_windows_password.jpg\" alt=\"find_windows_password\" width=\"590\" height=\"161\" \/><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">This method is free of all the technical hassle and thus can easily be adapted by any new user. So if you are one of them with your computer locked and need to find out your username and respective password, then this method would be the most viable one.\u00a0<\/span><span style=\"font-family: arial, helvetica, sans-serif\">So if you are contended with the methods and contents of this article, make sure to check out more relevant Windows solutions on our <a href=\"https:\/\/www.iseepassword.com\/alternative-to-john-the-ripper.html\">official webpage<\/a>.<\/span><\/p>\n<p>Related Articles:<\/p>\n<ol>\n<li><span style=\"font-family: arial, helvetica, sans-serif\"><a href=\"https:\/\/www.iseepassword.com\/how-to-reset-hp-laptop-password.html\">How to reset Windows login password on HP laptop<\/a><\/span><\/li>\n<li><a href=\"https:\/\/www.iseepassword.com\/how-to-crack-my-windows-password.html\">2 ways to crack Windows login password without reinstalling system<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Hello guys, today we are going to coin up an essential topic which often triggers your mind while you work on your computer- \u201cHow to Find out your Windows Usernames and Passwords?\u201d Precisely saying, finding the username is not that a difficult job as you can clearly see the list of registered usernames on your [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1445,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[31],"tags":[],"class_list":["post-1559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows-tips"],"_links":{"self":[{"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/posts\/1559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/comments?post=1559"}],"version-history":[{"count":3,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/posts\/1559\/revisions"}],"predecessor-version":[{"id":11819,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/posts\/1559\/revisions\/11819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/media\/1445"}],"wp:attachment":[{"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/media?parent=1559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/categories?post=1559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/tags?post=1559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}