Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re: Toshiba NoteBooks BIOS Password Backdoor - Password Cracker
From: grenier () NEF ESIEA FR (Christophe GRENIER)
Date: Fri, 25 Feb 2000 16:31:22 +0100


If you can boot, it is possible to get a password with the same checksum
and enter the Bios. The checksum value is stored in Cmos. If you create a
recovery disk, this value is stored after the word "KEY" in the 1 first
sector (sector 0 is boot sector).

To crack Toshiba password (Award, AMI and some others models), you can
try CmosPwd (Dos/Win9x, WinNT, Linux versions) avaible at
http://www.esiea.fr/public_html/Christophe.GRENIER/

        Christophe
-------------------------------------------------------------------------------
  ,-~~-.___.     ._.                       -= GRENIER Christophe =-
 / |  '     \    | |"""""""""|              sysadm de nef.esiea.fr
(  )         0   | |         |                     ESIEA
 _/-, ,----'     | |         |          Ecole Superieure d'Informatique -
    ====         !_!--v---v--"          Electronique - Automatique
    /  \-'~;      |""""""""|
   /  __/~| ._-""||        |            Email: grenier () esiea fr
 =(  _____|_|____||________| http://www.esiea.fr/public_html/Christophe.GRENIER/
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault