[14021] in bugtraq
Re: Toshiba NoteBooks BIOS Password Backdoor - Password Cracker
daemon@ATHENA.MIT.EDU (Christophe GRENIER)
Fri Feb 25 17:01:04 2000
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.LNX.4.10.10002251623090.22504-100000@nef.esiea.fr>
Date: Fri, 25 Feb 2000 16:31:22 +0100
Reply-To: Christophe GRENIER <grenier@NEF.ESIEA.FR>
From: Christophe GRENIER <grenier@NEF.ESIEA.FR>
X-To: BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <20000223225208.18196.qmail@securityfocus.com>
If you can boot, it is possible to get a password with the same checksum
and enter the Bios. The checksum value is stored in Cmos. If you create a
recovery disk, this value is stored after the word "KEY" in the 1 first
sector (sector 0 is boot sector).
To crack Toshiba password (Award, AMI and some others models), you can
try CmosPwd (Dos/Win9x, WinNT, Linux versions) avaible at
http://www.esiea.fr/public_html/Christophe.GRENIER/
Christophe
-------------------------------------------------------------------------------
,-~~-.___. ._. -= GRENIER Christophe =-
/ | ' \ | |"""""""""| sysadm de nef.esiea.fr
( ) 0 | | | ESIEA
_/-, ,----' | | | Ecole Superieure d'Informatique -
==== !_!--v---v--" Electronique - Automatique
/ \-'~; |""""""""|
/ __/~| ._-""|| | Email: grenier@esiea.fr
=( _____|_|____||________| http://www.esiea.fr/public_html/Christophe.GRENIER/
-------------------------------------------------------------------------------