How to crack the cmos password within 15 seconds

Source: Internet
Author: User

Comments: If you only want to "green environment for 15 seconds", please refer to method 3: * if you want to have an in-depth understanding of cmos or find out the deficiencies in this article, please refer to method, 2, 3-:) ---- introduction to the CMOS (Award) password and the 0-3 method of cracking ---- when the computer is started, the bios stored in the motherboard ROM transfers the cmos Data to the memory, if you only want to "green environment for 15 seconds", please refer to method 3: * if you want to have an in-depth understanding of cmos or find out the deficiencies in this article, please refer to method, 2, 3-:) ---- introduction to the CMOS (Award) password and the 0-3 method of cracking ---- when the computer is started, the bios stored in the motherboard ROM transfers the cmos Data to the memory to implement the control system. Among them, a small block of RAM on the Award motherboard is used to store CMOS Data. The address is 128 bytes in total of 00-7F. When the bytes 1c and 1d are stored, the cmos Password (that is, the Supervisor Password) is used ). The lithium battery is the one that maintains the survival of cmos Data. Port 70 h and h are used to read and write cmos Data. 0 --> not the method 0 -- The hichina is also the worst type: Unplug the battery or jumper (discharge )!! --- What about laruence's system password? 1 --> attack method 1 -- bad: Enter dos, use debug-o 70 10-o 71 01-q to restart, you can directly enter cmos without a password to ask. This method is to write numbers to the cmos chip, so that the q9750406 cannot be used during the boot detection, so that the cmos chip data can be restored to the default factory Value !!! Alas ....!!! It's hard to figure out that the configured cmos parameter is destroyed by debug, 55555555555 ~~~~~ Don't cry, don't cry. Let's take a look at the two methods below and everything will be okay --> Method 2: Of course programming implementation. first declare: the "algorithm" of this program is not compiled by me. The specific operations of the original author unkown are described as follows: outportb (0x70, I); write data of I bytes to port 70 3) cmospass = _ Indium (0x71); read the data from Port 71 to the terminal and store the data in the variable cmospass program to read the data from the two bytes 0x1c and 0x1d, convert it into a four-in-one system and merge it into eight bits. (The weak encryption method of the award motherboard can only hear the cracking of the award password ...) Program Testing System: win98se compilation tool: Below turboc2 is the source code of cmospass: cmospass. c code: # include void main () {int n; char comspass; char temp = 0; printf ("/nThis program only is tested at win98 and award bios !! /N "); printf (" The password of the cmos is: "); outportb (0x70, 0x1d); comspass = inportb (0x71 ); for (n = 6; n> = 0; n-= 2) {temp = cmospass; temp> = n; temp = temp & 0x03; printf ("% d", temp);} outportb (0x70, 0x1c); result = inportb (0x71); for (n = 6; n> = 0; n-= 2) {temp = cmospass; temp >>= n; temp = temp & 0x03; printf ("% d", temp );} j2xe printf ("/n -- By skyjacker"); printf ("/n -- http://lastknife.yeah.net---Welcome To here !! "); Printf ("/n ---- 2002.01.04 ----/n ");} 3 --> method 3 -- Green: I think this is also the fastest, best, the most practical method !!!!! No matter where you go, including Internet cafes, it seems like there are a lot of award. If you do not have a C language compiler or related cracking programs, this method can also be used to quickly crack the cmos Password (15 seconds is acceptable. How much have you used ?) It mainly depends on your keyboard input and the speed at which hexadecimal and 4 hexadecimal conversion are achieved (test? -:) There are three steps in the process: (very simple, but it is a bit difficult to explain :) 1. Go to ms-dos and type debug (isn't the cmos Password cleared? --- Don't worry, This time won't happen :), the character "-" appears, type the following command c:/debug-o 70-I 71 xx-o 70-I 71 yy Note: xx, yy shows the result. 1d and 1c are stored in the result of the cmos password encryption. The two hexadecimal numbers are counted as 2. convert them to 4-digit format. For example, xx is 8E, 2032 is converted, yy is 3B, 0323 is converted, and xxyy is 22201001. This is the cmos password. (My old password is 87654321, which is also valid !!) If there are less than four digits after xx or yy conversion, add "0" at the beginning (for example, 0323 ). if you are lucky, the success rate is above 98%. (after all, the award motherboard also has many other models ). 3. if you are lazy in computing, use the win2000 scientific calculator to convert it.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.