I bought a used Dell Latitude e6540 from a garage sale. The people told me they couldn't get it to start up because the didn't know the password. I figured I could fix it and have a nice laptop, not knowing this is a pretty damn secure lappy. I got home and figured out what the problem is and they told me they never registered it with Dell, so getting Dell to help is out of the question.
The message : " This computer system is protected by a password authentication system. You can not access the data on this computer without the correct password. Please type the system or administrator password. "
On previous models of dell lappys with service tags ending in -595B, -2A7B and -D35B, scripts have been written by cryptographers, which output the master password based off the service tag ID, and the suffix of the model laptop.
The Problem : I have a laptop service tag ending in -IF66 . Scripts for the password generator don't exist or are extremely hard to find. One cryptographer by the alias, Dogbert, says "Bypassing the BIOS password of newer Dell models with a service tag ending in -1F66 is still only a trivial exercise in patience: DELL service tag: DELLSUX-1F66 password: qHXaL0ntli6Gu4c0".
He also says "The algorithm used to derive the password from the service tag is just a minor modification of the crap seen before. Is public-key cryptography really that hard to understand?".
I wish I knew that guy.
Dogbert has a script for the earlier models but hasn't done any recent work for the public. His blog is http://dogber1.blogspot.com/ .
With this particular model, I've found that removing the cmos battery and swapping jumpers does not work. The password I believe is stored in eeprom.
I'm willing to pay for someone to solve this. A Few sites online claim they have figured out the algo for the -1F66, but they seem fraudulent.
Does anyone have any advice or know how to remedy this situation? I greatly appreciate everyone's input.
Service Tag - 3147G12-1F66
Thanks,
mrcharles
The message : " This computer system is protected by a password authentication system. You can not access the data on this computer without the correct password. Please type the system or administrator password. "
On previous models of dell lappys with service tags ending in -595B, -2A7B and -D35B, scripts have been written by cryptographers, which output the master password based off the service tag ID, and the suffix of the model laptop.
The Problem : I have a laptop service tag ending in -IF66 . Scripts for the password generator don't exist or are extremely hard to find. One cryptographer by the alias, Dogbert, says "Bypassing the BIOS password of newer Dell models with a service tag ending in -1F66 is still only a trivial exercise in patience: DELL service tag: DELLSUX-1F66 password: qHXaL0ntli6Gu4c0".
He also says "The algorithm used to derive the password from the service tag is just a minor modification of the crap seen before. Is public-key cryptography really that hard to understand?".
I wish I knew that guy.
Dogbert has a script for the earlier models but hasn't done any recent work for the public. His blog is http://dogber1.blogspot.com/ .
With this particular model, I've found that removing the cmos battery and swapping jumpers does not work. The password I believe is stored in eeprom.
I'm willing to pay for someone to solve this. A Few sites online claim they have figured out the algo for the -1F66, but they seem fraudulent.
Does anyone have any advice or know how to remedy this situation? I greatly appreciate everyone's input.
Service Tag - 3147G12-1F66
Thanks,
mrcharles