Changed workgroup and now unable to use PC

Posted on 2003-03-13
Medium Priority
Last Modified: 2013-12-04
My laptop is on the work LAN and I have dabbled with creating a workgroup (WLAA) which I selected. (Thus taking it off the Domain that it was on).

I had to restart the computer for the changes to take effect, and now it doesn't recognise me when I try to login. That is the only change I made - so how do I reset the domain, if I can't get past the login screen?

Apologies for the lack of technical terminology - our Tech Support guy is off sick, and it's all fallen apart!

Question by:kpnut
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Expert Comment

ID: 8127701

I am assuming that you are using a win2k machine?  Try logging in as Administrator.  I have no ides what the password is, but try leaving it blank, or: password.

This will get you in as local administrator.

If you are just trying to get back on the corporate network, try clicking the down arrow for the workgroup/domain selection box at the login screen.  You can probably still select the old domain name & get back in that way as well.


Author Comment

ID: 8129127
The options button is disabled and doesn't give me the option to rechoose the domain.
Have tried to logon as Administrator - all to no avail.

Any ideas?

Author Comment

ID: 8129212
The options button is disabled and doesn't give me the option to rechoose the domain.
Have tried to logon as Administrator - all to no avail.

Any ideas?
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  


Expert Comment

ID: 8129264
How adventurous are you?

Brute Force Method:
You could blank the local admin password with the following utility:
THIS _MAY_ HOSE YOUR DISK! (Very small chance, but out of the 40-50x's I have used it, I never lost a machine... Yet)
This would allow you back on the box as a local Administrator!

Have you tried your domain username/password?
Have you tried logging in as Guest?
What about hitting <F8> when the machine starts, and choose: "Safe Mode with Networking" & change the config to be on the domain?

Accepted Solution

aftershoq earned 400 total points
ID: 8132048
Sorry kpnut, but your outta luck.  Once you pull a machine out of a domain, you loose the right to log with your domain account.  You have two options now:

1) guess the administrator password, then add the computer back into the domain.

2) use the utility mentioned above to crack the administrator password, then add the compute back into the domain.

When you go to add it back into the domain, it will ask for someone who has rights to add it.  Just put in your username and password.  If that doesn't work, then you need to put "domain\username" and your password (domain being the one you log into).  If you still get an error, then the administrators might have taken the right "add workstations to domain" away from regular users like yourself.

Expert Comment

ID: 8134083
Not REALLY Aftershog, check this out!


Free Tools
There are Linux boot disks that have NT file system drivers and software that will read the registry and rewrite the password hashes for any account including the Administrators. This process requires physical access to the console and an available floppy drive but it works like a charm! I've done it myself several times with no glitch or problem whatsoever.

Offline NT Password & Registry Editor
at http://home.eunet.no/~pnordahl/ntpasswd

Update: It seems that the Offline NT Password & Registry Editor is now available as a bootable CD image. It also features new drivers and empty password capabilities. It was tested on NT 4.0, W2K and XP, but it is NOT compatible with Active Directory.

John the Ripper 1.6
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP LM hashes, plus several more with contributed patches.

at http://www.openwall.com/john


Expert Comment

ID: 8163924
Call you IT guy at home! Or try logging in with your domain name \ username and then put your password in

If the domain name was WORKDOMAIN and your username was JoeBob then try

WORKDOMAIN\JoeBob and type in your password.


Expert Comment

ID: 9070719
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
Post your closing recommendations!  No comment means you don't care.

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question