Vulnerability Development mailing list archives

Re: local security workaround through IE


From: mtinberg () MADISON TEC WI US (Mark Tinberg)
Date: Thu, 6 Apr 2000 09:43:33 -0500


At work we used to keep a copy of AntiCMOS around for just these cases (they don't bother to protect the CMOS so 
sometimes users decide to make a few changes, then password it).  I would imagine that if you could read from the 
floppy after the OS is loaded you could run your own program to remove the password from CMOS memory, then reboot, no 
cracking of the case required.

Our new motherboards (Intel) have a jumper to reset the CMOS so I haven't had to use this, but you get the idea.

Bluefish <11a () GMX NET> 04/05/00 07:34AM >>>
      Well, no.  Say you are at a library; the BIOS is protected by a
password.. place is busy, people around you, librarians watching.. are
you going to be able to open up the case, reset the BIOS (even via other
methods), boot a disk, circumvent the security?  No.


Current thread: