Vulnerability Development mailing list archives

Re: Award 4.51PG (copyrighted 1998), new backdoor SY_MB


From: Doug Kahler <dougak () TAMPABAY RR COM>
Date: Fri, 28 Jul 2000 21:21:52 -0400

You wouldnt happen to have a Soyo mainboard? the SY in the backdoor password
makes me think its a backdoor password Soyo may have put in the BIOS. I have
a Soyo 6BA+III mainboard and that backdoor password works on it.


----- Original Message -----
From: "Bluefish" <11a () GMX NET>
To: <VULN-DEV () SECURITYFOCUS COM>
Sent: Friday, July 28, 2000 9:01 PM
Subject: Award 4.51PG (copyrighted 1998), new backdoor SY_MB


While doing some dirty work for Christophe Grenier (we help eachothers
once in a while, both develop different BIOS password recovery tools) I
tested the Award 4.51/4.60 masterpassword cracker in my own toolkit,
!BIOS. To my surprise, it actually printed a password (on other computers
I've tried so far it has only returned junk - the manufacturer has not
enabled the backdoor passsword).

After some testing, it turns out password works. I am however not sure how
many computers have this backdoor password installed. If people
successfully uses this backdoor, please send me a message so I get an idea
of how common this passoword is.

The backdoor password is: SY_MB

NOTICE: This password is case-sensitive. Keep shift down while typing the
password. Also, the BIOS assumes American keyboard layout, so the
underscore is shift down and pressing the second key left of backspace
(the "?+\" key on Swedish keyboards)

My thanks goes to Juergen Gloeckener who created the original
Award 4.51/4.60 Masterpassword cracker and aided me in porting it to
"!BIOS".

..:::::::::::::::::::::::::::::::::::::::::::::::::..
     http://www.11a.nu || http://bluefish.11a.nu
    eleventh alliance development & security team


Current thread: