Работа с BIOS материнской платы

Сброс пароля на BIOS ноутбуков Toshiba

Утилита позволяющая создать дискету, загрузив с которой ноутбук можно добиться сброса парольной защиты BIOS.

Просмотр пароля на LILO (LInux LOader)

Утилита позволяющая просматривать пароль на LILO (LInux LOader)

Просмотр пароля на BIOS

Небольшая утилита позволяющая просматривать пароли установленные на BIOS материнской платы. Поддерживаются практически все разновидности BIOS используемые на данный момент.

!BIOS

!Bios is a tool originally developed for a brute, blunt removal of passwords from BIOSes. Through it's development it has been severly extended, and Eleventh Alliance have now recieved emails from computer support divisions, hackers and not least of all ordinary computer users who has expressed gratitude for what they consider one of the best toolkits available. Features: !Bios can decrypt the passwords used in some most common BIOS (including various bioses/versions by IBM, American Megatrends Inc, Award and Phoenix). !Bios can also save and restore the IBM standard CMOS/NVRAM memory where almost all common Bioses store the BIOS setup settings. !Bios can save the part of the RAM dedicated for the BIOS (which has security implications in some BIOSes as encryption algorithms and/or password may actually reside here in some badly coded BIOSes). !Bios can do crude, brutal attacks ("blasters") which removes password from a lot of Bioses. A bit dangerous though, can give unexpected and unwanted results. !Bios has a CMOS editor where you through a interface with similarities to several hex-editors can modify the CMOS/NVRAM memory in binary, decimal and hexadecimal ways. (only adviced for very experienced hackers) !Bios has a command line interface (CLI) and a very simple VGA-text interface, GUI. If no parameters is passed to !Bios, it starts the easy-to-use GUI, otherwise it starts the GUI. !Bios has built-in support pages which provides several tricks and tips, notes about known backdoors etc.

BIOS

Bios

Saving and restoring the BIOS settings

  • Validating actual settings to saved settiings
  • Deleting the BIOS settings (there are somme strange cases...)
  • Displaying information about the BIOS, BIIOS Extensions and BIOS beepcodes
  • Finding BIOS passwords for Award, Ami, Phhoenix and AST BIOS
  • Finding BIOS universal passwords for Awarrd BIOS
  • Dumping the whole BIOS segment to disk
  • Switching the 1st and 2nd level caches onn/off
  • Turning the PC into Suspend or Stand-By mmode (requires APM 1.1+)
  • Turning off the PC (requires APM 1.2+)
  • Rebooting the PC (cold/warm/int19)
  • Freeware