Vulnerability Development mailing list archives

Award 4.51PG (copyrighted 1998), new backdoor SY_MB


From: Bluefish <11a () GMX NET>
Date: Sat, 29 Jul 2000 03:01:10 +0200

While doing some dirty work for Christophe Grenier (we help eachothers
once in a while, both develop different BIOS password recovery tools) I
tested the Award 4.51/4.60 masterpassword cracker in my own toolkit,
!BIOS. To my surprise, it actually printed a password (on other computers
I've tried so far it has only returned junk - the manufacturer has not
enabled the backdoor passsword).

After some testing, it turns out password works. I am however not sure how
many computers have this backdoor password installed. If people
successfully uses this backdoor, please send me a message so I get an idea
of how common this passoword is.

The backdoor password is: SY_MB

NOTICE: This password is case-sensitive. Keep shift down while typing the
password. Also, the BIOS assumes American keyboard layout, so the
underscore is shift down and pressing the second key left of backspace
(the "?+\" key on Swedish keyboards)

My thanks goes to Juergen Gloeckener who created the original
Award 4.51/4.60 Masterpassword cracker and aided me in porting it to
"!BIOS".

..:::::::::::::::::::::::::::::::::::::::::::::::::..
     http://www.11a.nu || http://bluefish.11a.nu
    eleventh alliance development & security team


Current thread: