M
mm
I think a virus put a BIOS password in my friend's HP Mini 1000
netbook. I know I didn't do it, and I know it had malware. I've read
online several other stories from those who never set a password and
are still stuck with one.
I read about one repair shop that wanted 325 dollars to unlock the
BIOS.
Another website wanted $50,
But Dogbert has programs to do it for free!
For HP, Dell, Fujitsu, Samsung, Compaq, and all that use Phoenix
bioses.
Check it out.
http://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html
Let's hear it for Dogbert! [enormous applause]
I don't know if he says it, but the hash number to convert shows up
after you enter the wrong password three times in a row.
(add more newsgroups, had to split into 2 or more posts)
microsoft.public.windowsxp.general,alt.comp.os.windows-xp,comp.sys.hp.misc,comp.sys.hp.hardware,
comp.sys.laptops,alt.comp.virus,alt.comp.anti-virus
And he gives his source code too. Actually everything is in the 3
lines after the comments. Here they are for an HP netbook, for
example, but you have to look at the page too:
def decode(code):
table = {'1': '3', '0': '1', '3': 'F', '2': '7', '5': 'Q',
'4': 'V', '7': 'X', '6': 'G', '9': 'O', '8': 'U', 'a': 'C', 'c': 'E',
'b': 'P', 'e': 'M', 'd': 'T', 'g': 'H', 'f': '8', 'i': 'Y', 'h': 'Z',
'k': 'S', 'j': 'W', 'm': '4', 'l': 'K', 'o': 'J', 'n': '9', 'q': '5',
'p': '2', 's': 'N', 'r': 'B', 'u': 'L', 't': 'A', 'w': 'D', 'v': '6',
'y': 'I', 'x': '4', 'z': '0'}
That is:
'1': '3',
'0': '1',
'3': 'F',
'2': '7',
'5': 'Q',
'4': 'V',
'7': 'X',
'6': 'G',
'9': 'O',
'8': 'U',
'a': 'C',
'c': 'E',
'b': 'P',
'e': 'M',
'd': 'T',
'g': 'H',
'f': '8',
'i': 'Y',
'h': 'Z',
'k': 'S',
'j': 'W',
'm': '4',
'l': 'K',
'o': 'J',
'n': '9',
'q': '5',
'p': '2',
's': 'N',
'r': 'B',
'u': 'L',
't': 'A',
'w': 'D',
'v': '6',
'y': 'I',
'x': '4',
'z': '0'
Which for some reason is 18 pairs of numbers or letters and what
character they should be converted to, each pair in reverse order from
the normal order of numbers or letters. As in a, c, b, d, f, e.... Do
you know why he did it that way? Anyhow, logically, if not
programically, it is the same as what follows so you don't even need
the program to do a mere 10 characters. Don't forget, this one is
just HP netbooks.
0: 1,
1: 3,
2: 7,
3: F,
4: V,
5: Q,
6: G,
7: X,
8: U,
9: O,
a: C,
b: P,
c: E,
d: T,
e: M,
f: 8,
g: H,
h: Z,
i: Y,
j: W,
k: S,
l: K,
m: 4,
n: 9,
o: J,
p: 2,
q: 5,
r: B,
s: N,
t: A,
u: L,
v: 6,
w: D,
x: 4,
y: I,
z: 0
Come to think of it, if the encoding is just simple replacement of one
character with another, it would be easy in most cases to figure out
the code. Just get a simlar computer, set a password for the BIOS
using no character more than once, refuse to put the right password in
until you get the hash code at the end, and record the mapping. Do it
again with different passwords until you get all 36 characters. But
Dogbert has done this for you for many many computers. Let's hear it
for Dogbert! [thunderous applause]
Yes, I'm sure the malware did it, maybe to keep a user from changing
the boot order so that booting from the USB came first. Fortunately,
I had changed it already (although the virus seems to have changed it
back.) and also fortunately this HP unit has a separate, afaik
non-password-protectable screen that allows a one-shot change in boot
order.
netbook. I know I didn't do it, and I know it had malware. I've read
online several other stories from those who never set a password and
are still stuck with one.
I read about one repair shop that wanted 325 dollars to unlock the
BIOS.
Another website wanted $50,
But Dogbert has programs to do it for free!
For HP, Dell, Fujitsu, Samsung, Compaq, and all that use Phoenix
bioses.
Check it out.
http://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html
Let's hear it for Dogbert! [enormous applause]
I don't know if he says it, but the hash number to convert shows up
after you enter the wrong password three times in a row.
(add more newsgroups, had to split into 2 or more posts)
microsoft.public.windowsxp.general,alt.comp.os.windows-xp,comp.sys.hp.misc,comp.sys.hp.hardware,
comp.sys.laptops,alt.comp.virus,alt.comp.anti-virus
And he gives his source code too. Actually everything is in the 3
lines after the comments. Here they are for an HP netbook, for
example, but you have to look at the page too:
def decode(code):
table = {'1': '3', '0': '1', '3': 'F', '2': '7', '5': 'Q',
'4': 'V', '7': 'X', '6': 'G', '9': 'O', '8': 'U', 'a': 'C', 'c': 'E',
'b': 'P', 'e': 'M', 'd': 'T', 'g': 'H', 'f': '8', 'i': 'Y', 'h': 'Z',
'k': 'S', 'j': 'W', 'm': '4', 'l': 'K', 'o': 'J', 'n': '9', 'q': '5',
'p': '2', 's': 'N', 'r': 'B', 'u': 'L', 't': 'A', 'w': 'D', 'v': '6',
'y': 'I', 'x': '4', 'z': '0'}
That is:
'1': '3',
'0': '1',
'3': 'F',
'2': '7',
'5': 'Q',
'4': 'V',
'7': 'X',
'6': 'G',
'9': 'O',
'8': 'U',
'a': 'C',
'c': 'E',
'b': 'P',
'e': 'M',
'd': 'T',
'g': 'H',
'f': '8',
'i': 'Y',
'h': 'Z',
'k': 'S',
'j': 'W',
'm': '4',
'l': 'K',
'o': 'J',
'n': '9',
'q': '5',
'p': '2',
's': 'N',
'r': 'B',
'u': 'L',
't': 'A',
'w': 'D',
'v': '6',
'y': 'I',
'x': '4',
'z': '0'
Which for some reason is 18 pairs of numbers or letters and what
character they should be converted to, each pair in reverse order from
the normal order of numbers or letters. As in a, c, b, d, f, e.... Do
you know why he did it that way? Anyhow, logically, if not
programically, it is the same as what follows so you don't even need
the program to do a mere 10 characters. Don't forget, this one is
just HP netbooks.
0: 1,
1: 3,
2: 7,
3: F,
4: V,
5: Q,
6: G,
7: X,
8: U,
9: O,
a: C,
b: P,
c: E,
d: T,
e: M,
f: 8,
g: H,
h: Z,
i: Y,
j: W,
k: S,
l: K,
m: 4,
n: 9,
o: J,
p: 2,
q: 5,
r: B,
s: N,
t: A,
u: L,
v: 6,
w: D,
x: 4,
y: I,
z: 0
Come to think of it, if the encoding is just simple replacement of one
character with another, it would be easy in most cases to figure out
the code. Just get a simlar computer, set a password for the BIOS
using no character more than once, refuse to put the right password in
until you get the hash code at the end, and record the mapping. Do it
again with different passwords until you get all 36 characters. But
Dogbert has done this for you for many many computers. Let's hear it
for Dogbert! [thunderous applause]
Yes, I'm sure the malware did it, maybe to keep a user from changing
the boot order so that booting from the USB came first. Fortunately,
I had changed it already (although the virus seems to have changed it
back.) and also fortunately this HP unit has a separate, afaik
non-password-protectable screen that allows a one-shot change in boot
order.