[14021] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Toshiba NoteBooks BIOS Password Backdoor - Password Cracker

daemon@ATHENA.MIT.EDU (Christophe GRENIER)
Fri Feb 25 17:01:04 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.10002251623090.22504-100000@nef.esiea.fr>
Date:         Fri, 25 Feb 2000 16:31:22 +0100
Reply-To: Christophe GRENIER <grenier@NEF.ESIEA.FR>
From: Christophe GRENIER <grenier@NEF.ESIEA.FR>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000223225208.18196.qmail@securityfocus.com>

If you can boot, it is possible to get a password with the same checksum
and enter the Bios. The checksum value is stored in Cmos. If you create a
recovery disk, this value is stored after the word "KEY" in the 1 first
sector (sector 0 is boot sector).

To crack Toshiba password (Award, AMI and some others models), you can
try CmosPwd (Dos/Win9x, WinNT, Linux versions) avaible at
http://www.esiea.fr/public_html/Christophe.GRENIER/

	Christophe
-------------------------------------------------------------------------------
  ,-~~-.___.	 ._. 		  	   -= GRENIER Christophe =-
 / |  '     \	 | |"""""""""|              sysadm de nef.esiea.fr
(  )         0	 | |         |	   	  	   ESIEA
 _/-, ,----'	 | |         |     	Ecole Superieure d'Informatique -
    ====         !_!--v---v--" 	   	Electronique - Automatique
    /  \-'~;      |""""""""|
   /  __/~| ._-""||        |       	Email: grenier@esiea.fr
 =(  _____|_|____||________| http://www.esiea.fr/public_html/Christophe.GRENIER/
-------------------------------------------------------------------------------

home help back first fref pref prev next nref lref last post