Re: Toshiba NoteBooks BIOS Password Backdoor - Password Cracker

From: Christophe GRENIER (grenierat_private)
Date: Fri Feb 25 2000 - 07:31:22 PST

  • Next message: suidat_private: "Corel Linux 1.0 local root compromise"

    If you can boot, it is possible to get a password with the same checksum
    and enter the Bios. The checksum value is stored in Cmos. If you create a
    recovery disk, this value is stored after the word "KEY" in the 1 first
    sector (sector 0 is boot sector).
    
    To crack Toshiba password (Award, AMI and some others models), you can
    try CmosPwd (Dos/Win9x, WinNT, Linux versions) avaible at
    http://www.esiea.fr/public_html/Christophe.GRENIER/
    
    	Christophe
    -------------------------------------------------------------------------------
      ,-~~-.___.	 ._. 		  	   -= GRENIER Christophe =-
     / |  '     \	 | |"""""""""|              sysadm de nef.esiea.fr
    (  )         0	 | |         |	   	  	   ESIEA
     _/-, ,----'	 | |         |     	Ecole Superieure d'Informatique -
        ====         !_!--v---v--" 	   	Electronique - Automatique
        /  \-'~;      |""""""""|
       /  __/~| ._-""||        |       	Email: grenierat_private
     =(  _____|_|____||________| http://www.esiea.fr/public_html/Christophe.GRENIER/
    -------------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:37:12 PDT