Penetration Testing mailing list archives

Re: Laptop Password.


From: "G. Chomic" <secure.computing () gmail com>
Date: Sat, 01 Jul 2006 12:58:30 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Satelite 6xxx series Toshiba's.

Remove power, battery.  After doing so, hold down the power button for
30 seconds.  It sets BIOS to default, including the password.  Simply
having a bad/exhausted CMOS battery won't, incidentally - the password
is remembered even if all other settings are forgotten on that model.

That probably doesn't help this case, but it might for others.

YMMV,
Gabe

Jacob Weeks wrote:
I've had to refurb panasonic laptops before, and they have a special
cable you need to connect from the ps2 port to the com1 port (been a
few years there, might be off), with the correct pinout blows out a
boot password.  They gave us the directions to create the cable, they
didn't sell it or give it to us.

Dell might have somthing similar.


On 6/28/06, Nervox <nervox () gmail com> wrote:
Greetings

Part of a small audit i did in the company some laptops are found to
have a password(either PoP or just to change values in the BIOS).On a
desktop most of the time all you need is to take out the battery to
get rid of it, but for laptops (DELL in this case) i know that it is
in (if memory serve correct) an EPROM.In case of theft i know that the
PoP will protect form a casual thief but i know first hand that DELL
has a backdoor system , they send the serial number to the mother
company (always wanted to say that) they check if it stolen and if not
they send a password to be entered.
Now is there a possibility that someone has created a generator for
these password?Is it known ? I mean security throughout obscurity (if
you can call it like this in this case) is obviously something that i
wouldn't trust.

Any comment /Ideas?

Best Regards Nervox

------------------------------------------------------------------------------

This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the
Analyst's
Choice Award from eWeek. As attacks through web applications continue
to rise,
you need to proactively protect your applications from hackers. Cenzic
has the
most comprehensive solutions to meet your application security
penetration
testing and vulnerability management needs. You have an option to go
with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm
your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------





-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEpqm2ZEPQmWb53voRAmK0AJ93Gu5gNKmfEDVL4zSwbNwUvIUc/QCbBRgC
e3zH1fVzUrVcHkeDAh/rRAE=
=jm/n
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: