Unlike many password-cracking programs that allow you to simply boot from CD or floppy to crack Windows-based passwords, if there's a power-on password setup in the BIOS, your options can be limited. The best way to get rolling is to simply try and guess the password yourself. For starters, on desktop and server systems, there are a lot of default backdoor passwords you can try. A previously published article, How to Bypass BIOS Passwords,...
and Computer Hopes' all-in-one reference guide to hacking BIOS passwords contain comprehensive lists.
If you know who is/was the user or previous owner of the computer, you should try some common passwords such as their user's name, company name and so on to see if you can get it. Unless you're really into computer hardware hacking and can create a keyboard simulator to send your passwords brute-force style at wire speed, you'll have to enter each password manually. It's slow, but it can work, especially given the fact that most passwords are trivial.
There are a couple of other published tricks for getting around BIOS passwords on Toshiba and IBM Aptiva computers. If you have a Toshiba system, hold down the left shift key during boot. If you have an IBM Aptiva, the trick is to press both mouse buttons in quick succession during boot. You can also hold down one ore more keys on your keyboard during boot to try and overload your keyboard buffer. Odds are you'll just end up getting a lot of angry beeps back from your computer, but it's worth a try. You can also take a crack at repeatedly hitting the F1, F2, F10, F11, F12 or ESC key as well.
BIOS password hacking
Step 1: Guess BIOS passwords yourself
Step 2: Fiddle with the hardware
Step 3: Crack them with software
Step 4: Managing the BIOS password
|ABOUT THE AUTHOR:|
| Kevin Beaver, CISSP, is an independent information security consultant, author and speaker with Atlanta-based Principle Logic LLC. He has more than 18 years of experience in IT and specializes in performing information security assessments. Beaver has written five books including Hacking For Dummies (Wiley), Hacking Wireless Networks For Dummies, (Wiley) and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). He can be reached at firstname.lastname@example.org.
Copyright 2006 TechTarget