Done. Dumped BIOS twice with special clamps using CH341A. Both hashes was identical. I hope this time it is correct one, as it has AMITSESetup. Unfortunately, my skills in Ami BIOS decryption are poor.
If I clearly understood (after some research , these hex values contains boot and bios admin passwords:
[CODE]6F 71 10 E7 64 9A CB 2C 7D 2E 5B 15 A5 09 F0 96 BE 9E C6 B0 03 63 E7 4F 53 53 DF 29 04 6A E6 03
10 5F B8 A5 BC 75 08 08 14 BC E6 CA A4 6D C0 9C E3 18 1E 22 03 A6 3B 76 82 3E 13 E1 78 B7 AE 41[/CODE]
But still I'm struggling to decrypt them. Your help in unlocking...
Should be suffix shown after 3 incorrect password attempts? How can I reveal it? [ATTACH=JSON]{"data-align":"none","data-size":"small","data-attachmentid":3602316}[/ATTACH]...
Need a help unlocking Dell Inspiration 5505 BIOS (Service Tag-C4T93B3, EX-26412385791) with boot/admin password set. Attaching dump of BIOS chip (16MB).
Yea, thanks for info. Found another Winbond chip on board : 25Q128JVPQ. Looks like it is the one I need to dump, but unfortunately can't get clamps on it. Too small contacts, low profile chip
Hi all,
Need a help unlocking BIOS. Asus Zenbook 14'' UX435E. Board UX435EG Rev.2.0. S/N: 24MM8N0CX16C321334. BIOS chip Winbond 25Q80DV.
Thank you....
Leave a comment: