Vulnerability Development mailing list archives

Reading PC BIOS "flash" (NVRAM)


From: 11a () GMX NET (Bluefish)
Date: Fri, 14 Jul 2000 11:02:40 +0200


I'm the main developer of !BIOS, a PC BIOS Security and Maintains
toolkit. I've recieved questions about adding a flash support to the
toolkit.

This is in light of three factors;

 - Flashes are known to contain algorithms and deafult passwords;
   at least two cases of reverse-engineering flashes or RAM dumps are
   known to be behind successfull BIOS password crackers.

 - The Flashupdates are often compressed and/or encrypted, to simply dump
   current flash should prove to reduce work.

 - There is a shortage of utility in this field; !BIOS can currently only
   dump BIOS dedicated RAM areas, and some flash-update-deciphers exists.

So, therefor I'm interested in pointers to sites, books or sourcecode
which reads from the common PC BIOS "flash".

..:::::::::::::::::::::::::::::::::::::::::::::::::..
     http://www.11a.nu || http://bluefish.11a.nu
    eleventh alliance development & security team


Current thread: