home *** CD-ROM | disk | FTP | other *** search
- =========================================================================
- CmosPwd
- Christophe GRENIER
- grenier@cgsecurity.org
- http://www.cgsecurity.org
- =========================================================================
-
- CmosPwd 4.0 is a cmos/bios password recovery tool.
- CmosPwd is under GNU Public License. You can freely distribute it.
-
-
- Bios and history
-
- Acer/IBM 1.3
- AMI BIOS 1.0
- AMI WinBIOS (12/15/93) 1.4d
- AMI WinBIOS 2.5 1.0 & 2.7
- Award 4.5x 1.0 & 1.4c & 2.3 & 2.8 & 2.9
- Award Medallion 6 3.1
- Compaq (1992) 1.0
- Compaq 1.4 & 3.0
- Phoenix A08, 1993 1.0
- IBM (PS/2, Activa ...) 1.3
- IBM Thinkpad boot pwd 1.5
- IBM 300 GL 1.5
- Packard Bell Supervisor/User 1.4
- Phoenix 1.00.09.AC0 (1994) 1.0
- Phoenix 1.04 1.4
- Phoenix 1.10 A03/Dell GXi 1.4c
- Phoenix 4 release 6 (User) 1.6 & 2.2
- Phoenix 4.05 rev 1.02.943 2.6
- Phoenix 4.06 rev 1.13.1107 2.6
- Gateway Solo - Phoenix 4.0 r6 2.4
- Toshiba 2.1
- Zenith AMI 1.5
-
-
- ---------------------------------------------------
- ---------------------------------------------------
- ª Typical Usage for DOS and all Windows users ª
- ---------------------------------------------------
- ---------------------------------------------------
-
- 1) Identify your BIOS manufacturer (usually displayed at boot-up)
-
- 2) Start in DOS, or start a DOS session in Windows 95/98/ME.
- For Windows NT or Windows 2000 boot from a DOS or Windows 95/98 boot
- disk (you can find boot disks at www.AnswersThatWork.com), and run
- CMOSPWD from your boot floppy (or another floppy).
-
- 3) C: [Enter]
- CD\CMOS_Pwd [Enter]
-
- 4) Type CMOSPWD at the DOS prompt and press Enter.
-
- 5) CMOSPWD will display a list of possibilities. Use the possibilities
- itemised against your BIOS manufacturer.
- Remember :
-
- a) For AWARD BIOSes, use the Numeric Keypad (with NumLock ON).
- b) AWARD 4.50PG BIOS always accepts "AWARD_SW", or "d8on",
- or "589589".
- c) Old Phoenix BIOSes will accept "phoenix".
-
- 6) If the standard method does not work, then try to kill
- the CMOS password with CMOSPWD /K (and press Enter),
- and then see if you can get into the CMOS without a password.
- If you can, you successfully "killed" the old CMOS password.
- DO NOT KILL THE CMOS on IBM ThinkPad 765 laptops.
-
- 7) If you cannot kill the CMOS with CMOSPWD, then try the following,
- all done from the DOS prompt of real DOS or of a DOS session :
-
- DEBUG [Enter]
- O 70 2E [Enter]
- O 71 0 [Enter]
- Q [Enter]
-
- (The first character of each line above MUST be a letter, so whenever
- you see "O", read it as the letter "O" and not the digit ZERO, "0").
-
-
- ---------------------------------------------------
- ---------------------------------------------------
- |General Usage (List of commands) |
- ---------------------------------------------------
- ---------------------------------------------------
-
- cmospwd [/d]
- cmospwd [/d] /[rlw] cmos_backup_file restore/load/write
- cmospwd /k kill cmos
- cmospwd /m[01]* execute selected module
-
- /d to dump cmos in ascii and scan code
- /m0010011 to execute module 3,6 and 7
-
- Keyboard:
- /kfr French AZERTY
- /kde German QWERTY
- default is US QWERTY
-
-
-
- Platforms
- - Dos-Windows version
- Well, ... it works!
-
- - Linux && BSD version
- Users can work on cmos backup but they need root priviledge to
- use ioperm function to have full access to cmos.
-
- - Windows NT && W2K
- Users can work on cmos backup. To work on cmos memory, gwiopm need to be
- installed and running.
- gwiopm gives direct port I/O access for specified ports to user-mode process
- (ring 3) using Ke386SetIoAccessMap and Ke386IoSetAccessProcess kernel functions.
- You need administrator priviledges to install this driver
- "instdrv gwiopm c:\tmp\gwiopm.sys"
- To remove the driver, run "instdrv gwiopm remove".
-
-
- ---------------------------------------------------
- ---------------------------------------------------
- |Laptops |
- ---------------------------------------------------
- ---------------------------------------------------
-
- The password is usually stored in an eeprom on the motherboard, you need an
- eeprom programmer (electronic device) to retrieve it.
- TP 380Z: eeprom 24c01
- TP 390: eeprom 24c03 (be carrefull, there are two eeprom)
- TP 770: eeprom 24c01
- TP 760C,765D: eeprom 93c46
- TP 600E, T21: 14 PIN 24RF08 (see http://www.ja.olm.net/unlock)
- HP Omnibook 4150,7150: eeprom AT24c164 (0x50-0xBF area)
- Dell Inspirion 7500: eeprom 24c164
- Dell Latitude ?: eeprom 24c02
- Compaq M700: eeprom 24C02
- You can get/buy eeprom programmer in electronic shops or labs, you need
- another PC to use it.
- You can desolder the eeprom with hot air or you can try to "clip" the
- eeprom. With the eeprom programmer, backup your eeprom and run
- "cmospwd /d /l eeprom_backup". If you don't see the password, you can try
- to fill the eeprom with zero or FF.
-
- ---------------------------------------------------
- ---------------------------------------------------
- |Toshiba |
- ---------------------------------------------------
- ---------------------------------------------------
- Differents passwords give the same 32-bit CRC, so CmosPwd can only give one
- of them.
- To reset the password of an old Toshiba, you can use KeyDisk. (cf my web page)
- If this doesn't work, you can try to build the Toshiba Parallell loopback.
- To make a simple device that you connect to your parallell port, a lot of
- Toshiba computers remove the password when you boot it up.
- The device, named "loopback" by some, could be made out of any
- parallell wire with 25pins connectors (db25). You should connect
- these pins: 1-5-10, 2-11, 3-17, 4-12, 6-16, 7-13, 8-14, 9-15, 18-25.
-
- A db25 looks like:
- 1 13
- _______
- \_____/
- 14 25
-
- ---------------------------------------------------
-
- Divers
- - Award 4.50PG
- There is an universal password AWARD_SW.
- (d8on, 589589 ... works too)
- - Award
- Differents passwords give the same 32-bit CRC, so CmosPwd can only give one
- of them. Use the numeric keypad.
- - COMPAQ LTE 5300 notebook
- Tolga Sinan Guney: there is a reset jumper on the motherboard
- - DIGITAL PC300, Phoenix 4.0 Rel 6.0,0
- Rene Pocisk: cmospwd /k works
- - Fujitsu ICL
- aksion: passwords are stored in EEPROM
- - Phoenix
- There is a backdoor in old version of Phoenix BIOS, the universal
- password is "phoenix".
- - Siemens Nixdorf
- PCD-4ND, Michael: You can clear the password of this phoenix 1.03 with "cmospwd /k"
- Scenic Mobil 700, Josef Benda: "cmospwd /k" works! Phoenix Note BIOS v4.0
-
-
- What to do if you can't use cmospwd to clear your cmos ?
- You can use debug to reset cmos CRC stored at 0x2E-0x2F
- debug
- -o 70 2E
- -o 71 0
- -q
-
-
-
- What to do if cmospwd don't work on your PC ?
-
- Try to clear password with cmospwd /k.
- If cmospwd /k doesn't work, password is stored in an EEPROM. Try to find a
- reset jumper on your motherboard or contact your PC vendor.
- If it works, I can try to discover how passwords are encrypted.
- I need to know what Bios you used and
- some cmos memory backup with their passwords. (cmospwd /w backupfile)
- For passwords, choose
- - some 1 and 2-letter passwords
- - BBBBBBB
- - BBBBBBC
- - BBBBBCB
- - BBBBCBB
- - BBBCBBB
- - BBCBBBB
- - BCBBBBB
- - CBBBBBB
-
-
-
- Thanks to
- - Philippe Garcia-Suarez (AMI Zenith, IBM Thinkpad)
- - Mark Miller (AMI WinBIOS)
- - Ian Sharpe (Award 4.51PG)
- - Darren Evans (Phoenix 4 release 6)
- - Teun van de Berg (bug report for "cmospwd /w")
- - Giovanni (IO access under NT)
- - Robert Rafai (Dell Latitude)
- - Guillaume Letessier (Toshiba)
- - hackvenger (Phoenix 4.0 realase 6.0)
- - "PUTA MADRE" (Award 4.51PG)
- - SerbianHacker/Sasha Miloshevic (IBM ThinkPad 770)
- - Michael (Siemens Nixdorf PCD-4ND, Phoenix 1.03)
- - w0rm (Phoenix a486 1.03)
- - Olaf Freyer (Phoenix 4.05 rev 1.02.943, Phoenix 4.06 rev 1.13.1107)
- - Peter "Bluefish" Magnusson, author of !BIOS
- - Tjiq (User password of AMI WinBIOS)
- - Jedi (Award 4.51PG)
- - Michel Creppy from Le Software Man
- - YOGESH M (Award 4.51PG)
- - Quattrocchi Stefano (Compaq DeskPro)
- - Pencho Penchev (Award Medallion 6.0)
- - Ernst Oudhof, bug correction for MODE_RESTORE_FORCE
- and to all the guys, who provided information about cmos and reported bugs.
-
- gwiopm has been written by Graham Wideman (http://www.wideman-one.com/).
- instdrv comes from Microsoft NTDDK.
-
-
- If you have problems or questions about cmospwd,
- please mail me.
-
- Christophe GRENIER
- grenier@cgsecurity.org
- http://www.cgsecurity.org
-
-