Hi there
I have a current model CF-54 with a password on it, I have done plenty of these in the past removing the chip and hex editing directly but this seems to be different, I am unable to located the GUID that normally stores the password in so cant locate it
Does anyone have any pointers on what to look for?
Here is the Bin File:
https://drive.google.com/file/d/1LefTN8z…iew?usp=sharing
Cheers
Edit by Fernando: Thread moved and thread title specified/customized
@plnewton :
Since you obviously don’t want a modded BIOS, but just know the location of the password, I have moved this thread into the “BIOS Modding Guides and Problems” Sub-Forum.
Furthermore I have specified/customized your chosen thread title.
I figured it out, and it took me a full year using UEFI NE Edit - Finding the AlGO and removing the hex that didn’t matter. I finally got the hash and used Hashcat to crack it. I apologize, but I cannot tell you the process, because I offer it as a service at toughbookbios.com
I have your hash, and I am working on it now because I wanted to show you I can do it.
There is always a 10%-30% chance I will not find the password
If we consider a “normal keyboard” to have:
- 26 lowercase letters (a-z)
- 26 uppercase letters (A-Z)
- 10 digits (0-9)
- 33 common symbols (e.g., !@#$%^&*()_±=[]{}|;’:”,.<>?/)
Then the total number of characters available for each position in the password is 26+26+10+33=9526
+26+10+33=95.
For an 8-character password, the total number of possible combinations is: 95×95×95×95×95×95
×95×95=95895×95×95
×95×95×95×95×95=958
958=6,634,204,312,890,
625958=6,634,204,312,
890,625
So there are 6.634 quadrillion possible combinations for an 8-character password using characters from a normal keyboard.
I can do any 8-character password in two hours.