The short answer is... No it isn't stored anywhere you can see it.
A work around that "usually" works. The caveat is that you have another linux box with a password that you "do" know.
There is a file called /etc/shadow. It will likely have quite a lines in it.
There will be a line similar to this.
dos2unix:$6$sD28D64H8mSNvwaB$gZ3RABsFy7YtdvxNEH8bU6sqX6A0Kcth1tkY.0leTP9NJFZGlTY0ZHLHCOLVjXNDV8vG/uPlVNjz8Oajd7I/Wo1::0:99999:17:::
The beginning of the line is obviously your username, or user ID. The numbers at the end of the line are your user "number" and group ID number. However you don't care too much about those parts.
It is the characters between the ":"'s right after your username that you want. Yes, it's a LOT of characters. copy and paste is preferred. You can type them in manually, but if you make one single typo, this won't work.
This is your encrypted password. Hackers feel free to un-encrypt mine here, This isn't my actual hash string, just random characters I typed in.
The idea is to boot from Linux USB drive, mount your /etc filesystem to the /mnt directory on your USB drive. (This doesn't really work from DVD/CD-ROM).
Then edit your /mnt/etc/shadow file. Replace the string between the :'s, in the case of the example above it would be the $6$sD28D64H8mSNvwaB$gZ3RABsFy7YtdvxNEH8bU6sqX6A0Kcth1tkY.0leTP9NJFZGlTY0ZHLHCOLVjXNDV8vG/uPlVNjz8Oajd7I/Wo1
You will need root or sudo privileges to do this. Also you will need the encrypted has string of a "known" password to paste in and replace the "unknown" password string.
Once you have done this, save the shadow file with the "new" password. Take the USB drive out and reboot. You should be able to login now.
Some LInux's have you create a root account and set a root password during the installation, as well as creating your own account and password. If you know the root password, you can login as root and reset your password.
#> passwd dos2unix (or whatever your username is). You will have to type in the password twice. Make sure you have it memorized, or (ahemm..) written down someplace safe. I personally recommend the memory method
and the "written down" method is insecure.