Wolf said:
Search on Windows Password Recovery Utilities.
Those hack at the memory copy of the SAM hive, not attack the partially
encrypted SAM file on the hard disk. The SAM database is at the heart
of the domain model. There is more than just login credentials stored
in there: user accounts, group accounts, policies for each, trust
relation accounts (SAM contains the Local Security Authority secrets
used in trusts and domain controller account passwords), domain
synchronization via NetLogon service, computer accounts (each NT machine
changes its computer-account password every 7 days), like between PDCs
and BDCs, SID (security identifier) assignment and tracking, etc. The
SAM is completely loaded into memory (some hives aren't loaded until
needed) and not allowed to page out to ensure maximum speed.
Something to try in a virtual machine: change permissions on the
HKLM\SAM and HKLM\SECURITY keys so you can expand those keys to reveal
the structure of the SAM. Modify the permissions by adding your user
account with Full Control to each subkey. I'm not interested in trying
this but read about it so maybe it works, maybe not.
Another trick I read about is running regedit.exe under the privilege
tokens for the SYSTEM account. That is, run regedit under the System
account. One way is to use SysInternals' psexec to specify the account
context for a process, as in "psexec.exe -s -i regedit.exe". You don't
have read permissions on those keys either as a regular or admin user
but the System account does.