CATEGORII DOCUMENTE |
Bulgara | Ceha slovaca | Croata | Engleza | Estona | Finlandeza | Franceza |
Germana | Italiana | Letona | Lituaniana | Maghiara | Olandeza | Poloneza |
Sarba | Slovena | Spaniola | Suedeza | Turca | Ucraineana |
HOW TO BYPASS BIOS
PASSWORDS
The aim of this article is to explain how to break
into a computer protected with a BIOS password. I'm not going to explain why
you should do this. I assume it's your own computer and you forgot the password
(however, by reading this article you should realize you can't rely on BIOS
passwords if you need to secure your computer).
I hope you are not trying to crack a stolen laptop/notebook PC because I also
own of them, and I wish you a hard disk crash with a complete loss of data you
absolutely need in this case
You must read and accept the disclaimer at
the end of this document before to read the document itself.
Accessing information on the hard disk
May
be you don't actually need to access the computer, but you only need to access
the information contained on the hard disk. In this case it could be more
convenient to remove it temporarely from that machine and put it as a secondary
hard disk on another machine, that you'll use as a host to retrieve data.
Before to put the hard disk on the host machine, set its jumper according to
the EIDE channel to which you are connecting it (master, slave, or stand
alone). Each disk drive has its own configuration, but it's usually explained
on a sticker on the top. Take note of the original position of the jumper
first, to set it back when you'll have to put the hard disk back to the
original machine.
When you turn on the host machine, enter the CMOS setup menu (usually you have
to press F2, or
Standard BIOS backdoor passwords
The first, less invasive, attempt to bypass a BIOS password is to try on of these standard manufacturer's backdoor passwords:
AWARD BIOS AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %a piaia%, %aa piaia%
AMI BIOS AMI,
A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND,
Other passwords you may try (for AMI/AWARD or other BIOSes) LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj
Note
that the key associated to ' ' in the
Flashing BIOS via software
If
you have access to the computer when it's turned on, you could try one of those
programs that remove the password from the BIOS, by invalidating its memory.
However, it might happen you don't have one of those programs when you have
access to the computer, so you'd better learn how to do manually what they do.
You can reset the BIOS to its default values using the MS-DOS tool DEBUG (type
DEBUG at the command prompt. You'd better do it in pure MS-DOS mode, not from a
MS-DOS shell window in Windows). Once you are in the debug environment enter
the following commands:
AMI/AWARD BIOS O 70 17 O 71 17 Q
Invalidates
CMOS RAM.
Should work on all AT motherboards
(XT motherboards don't have CMOS) O 70 2E O 71 FF Q Note that the first
letter is a 'O' not the number '0'. The numbers which
follow are two bytes in hex format.
Flashing BIOS via hardware
If you can't access the computer when it's on, and the standard backdoor passwords didn't work, you'll have to flash the BIOS via hardware. Please read the important notes at the end of this section before to try any of these methods.
Using the jumpers
The
canonical way to flash the BIOS via hardware is to plug, unplug, or switch a
jumper on the motherboard (for 'switching a jumper' I mean that you
find a jumper that joins the central pin and a side pin of a group of three
pins, you should then unplug the jumper and then plug it to the central pin and
to the pin on the opposite side, so if the jumper is normally on position 1-2,
you have to put it on position 2-3, or viceversa). This jumper is not always
located near to the BIOS, but could be anywhere on the motherboard.
To find the correct jumper you should read the motherboard's manual.
Once you've located the correct jumper, switch it (or plug or unplug it,
depending from what the manual says) while the computer is turned OFF. Wait a
couple of seconds then put the jumper back to its original position. In some
motherboards it may happen that the computer will automatically turn itself on,
after flashing the BIOS. In this case, turn it off, and put the jumper back to
its original position, then turn it on again. Other motherboards require you
turn the computer on for a few seconds to flash the BIOS.
If you don't have the motherboard's manual, you'll have to
'bruteforce' it trying out all the jumpers. In this case, try
first the isolated ones (not in a group), the ones near to the BIOS, and the
ones you can switch (as I explained before). If all them
fail, try all the others. However, you must modify the status of only one
jumper per attempt, otherwise you could damage the
motherboard (since you don't know what the jumper you modified is actually
meant for). If the password request screen still appear,
try another one.
If after flashing the BIOS, the computer won't boot when you turn it on, turn
it off, and wait some seconds before to retry.
Removing the battery
If you can't find the jumper to flash the BIOS or if such jumper doesn't exist, you can remove the battery that keeps the BIOS memory alive. It's a button-size battery somewhere on the motherboard (on elder computers the battery could be a small, typically blue, cylinder sealed to the motherboard, but usually has a jumper on its side to disconnect it). Take it away for 15-30 minutes or more, then put it back and the data contained into the BIOS memory should be volatilized. I'd suggest you to remove it for about 45 minutes to be sure, because if you put it back when the data aren't erased yet you'll have to wait more time, as you've never removed it.
Short-circuiting the chip
Another
way to clear the CMOS RAM is to reset it by short circuiting two pins of the
BIOS chip for a few seconds. You can do that with a small piece of electric
wire or with a bended paper clip. Always make sure that the computer is turned OFF before to try this
operation.
Here is a list of EPROM chips that are commonly used in the BIOS industry. You
may find similar chips with different names if they are compatible chips made
by another brand. If you find the BIOS chip you are working on matches with one
of the following you can try to short-cicuit the appropriate pins. Be careful, because this operation may
damage the chip.
CHIPS P82C206 (square)
Short together pins 12 and 32 (the first and the last pins on the bottom edge of the chip) or pins 74 and 75 (the two pins on the upper left corner).
gnd
74
|__________________
5v 75--| |
| |
| |
| CHIPS |
1 * | |
| P82C206 |
| |
| |
|___________________|
| |
| gnd | 5v
12 32
OPTi F82C206 (rectangular)
Short together pins 3 and 26 (third pin from left side and fifth pin from right side on the bottom edge).
80 51
|______________|
|- 50
| |
| |
| OPTi |
| |
| F82C206 |
| |
|| | |
1 || | | 30
3 26
Dallas DS1287, DS1287A
Benchmarq bp3287MT, bq3287AMT
The
Dallas DS1287 and DS1287A, and the compatible Benchmarq bp3287MT and bq3287AMT
chips have a built-in battery. This battery should last up to ten years. Any
motherboard using these chips should not have an additional battery (this means
you can't flash the BIOS by removing a battery). When the battery fails, the
RTC chip would be replaced.
CMOS RAM can be cleared on the 1287A and 3287AMT chips by shorting pins 12 and
21.
The 1287 (and 3287MT) differ from the 1287A in that the CMOS RAM can't be
cleared. If there is a problem such as a forgotten password, the chip must be
replaced. (In this case it is recommended to replace the 1287 with a 1287A).
Also the
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21 RCL (RAM Clear)
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 13
NOTE:
Although these are 24-pin chips
the
these are unused pins.
Most chips have unused pins
though usually they are still present.
Benchmarq bq3258S
Samsung KS82C6818A
This
is a rectangular 24-pin DIP chip, usually in a socket. The number on the chip
should end in 6818.
Although this chip is pin-compatible with the
Short together pins 12 and 24.
5v
24 20 13
|___________|____________________|
|
|
|> |
DS12885S |
|
| |
1 12
gnd
Motorola MC146818AP
Short pins 12 and 24. These are the pins on diagonally opposite corners - lower left and upper right. You might also try pins 12 and 20.
__________
1 -| U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd -|__________|- 13
Important
Whether
is the method you use, when you flash the BIOS not only the password, but also
all the other configuration data will be reset to the factory defaults, so when
you are booting for the first time after a BIOS flash, you should enter the
CMOS configuration menu (as explained before) and fix up some things.
Also, when you boot Windows, it may happen that it finds some new device,
because of the new configuration of the BIOS, in this
case you'll probably need the Windows installation CD because Windows may ask
you for some external files. If Windows doesn't see the CD-ROM try to eject and
re-insert the CD-ROM again. If Windows can't find the CD-ROM drive and you set
it properly from the BIOS config, just reboot with the reset key, and in the
next run Windows should find it. However most files needed by the system while
installing new hardware could also be found in C:WINDOWS C:WINDOWSSYSTEM, or C:WINDOWSINF .
Key Disk for Toshiba laptops
Some Toshiba notebooks allow to bypass BIOS by inserting a 'key-disk' in the floppy disk drive while booting. To create a Toshiba Keydisk, take a 720Kb or 1.44Mb floppy disk, format it (if it's not formatted yet), then use a hex editor such as Hex Workshop <https://www.bpsoft.com/downloads/index.html> to change the first five bytes of the second sector (the one after the boot sector) and set them to 4B 45 59 00 00 (note that the first three bytes are the ASCII for 'KEY' :) followed by two zeroes). Once you have created the key disk put it into the notebook's drive and turn it on, then push the reset button and when asked for password, press Enter. You will be asked to Set Password again. Press Y and Enter. You'll enter the BIOS configuration where you can set a new password.
Key protected cases
A final note about those old computers (up to 486 and early Pentiums) protected with a key that prevented the use of the mouse and the keyboard or the power button. All you have to do with them is to follow the wires connected to the key hole, locate the jumper to which they are connected and unplug it. That's all.
Disclaimer
To
the maximum extent permitted by law, the author disclaims all warranties
regarding this material, express or implied, including but not limited to
warranties of merchantability and fitness for a particular purpose and
non-infringement.
The author makes no warranties, implied or otherwise, as to the usefulness of
this material or the correctness of the information it provides.
In no event shall the author be liable for direct, indirect, special,
consequential, incidental, punitive or any other kind of damages caused by or
arising out of the use or inability to use this material even if he is aware of
the possibility of such damages or a known defect.
This material is provided 'as is' and 'as available',
without any warranty, and if you use it you do it at your own risk, with no
support.
The author makes no warranty the material will meet your requirements, or that
its availability will be uninterrupted, or that it is timely, secure, or error
free; nor does the author make any warranty as to the results that may be
obtained through the material or that defects will be corrected.
No advice or information, whether oral or written, which you obtain from the
author or through the material or third parts shall create any warranty not
expressly made herein.
By accessing or using this material, you are agreeing to these terms.
Politica de confidentialitate | Termeni si conditii de utilizare |
Vizualizari: 973
Importanta:
Termeni si conditii de utilizare | Contact
© SCRIGROUP 2024 . All rights reserved