No one can figure this out - BIOS password

Status
Not open for further replies.

mrcharles

Member
Oct 26, 2014
27
0
0
I bought a used Dell Latitude e6540 from a garage sale. The people told me they couldn't get it to start up because the didn't know the password. I figured I could fix it and have a nice laptop, not knowing this is a pretty damn secure lappy. I got home and figured out what the problem is and they told me they never registered it with Dell, so getting Dell to help is out of the question.

The message : " This computer system is protected by a password authentication system. You can not access the data on this computer without the correct password. Please type the system or administrator password. "

On previous models of dell lappys with service tags ending in -595B, -2A7B and -D35B, scripts have been written by cryptographers, which output the master password based off the service tag ID, and the suffix of the model laptop.

The Problem : I have a laptop service tag ending in -IF66 . Scripts for the password generator don't exist or are extremely hard to find. One cryptographer by the alias, Dogbert, says "Bypassing the BIOS password of newer Dell models with a service tag ending in -1F66 is still only a trivial exercise in patience: DELL service tag: DELLSUX-1F66 password: qHXaL0ntli6Gu4c0".

He also says "The algorithm used to derive the password from the service tag is just a minor modification of the crap seen before. Is public-key cryptography really that hard to understand?".

I wish I knew that guy.

Dogbert has a script for the earlier models but hasn't done any recent work for the public. His blog is http://dogber1.blogspot.com/ .

With this particular model, I've found that removing the cmos battery and swapping jumpers does not work. The password I believe is stored in eeprom.

I'm willing to pay for someone to solve this. A Few sites online claim they have figured out the algo for the -1F66, but they seem fraudulent.

Does anyone have any advice or know how to remedy this situation? I greatly appreciate everyone's input.

Service Tag - 3147G12-1F66

Thanks,
mrcharles
 

corkyg

Elite Member | Peripherals
Super Moderator
Mar 4, 2000
27,370
239
106
If it were my problem, I would send it to Dell. If they legitimately owned it and never registered it, that would not be a barrier. If, however, they did not legitimately own it, they might not want to send it to Dell because it may have been reported as stolen.
 
Last edited:

inachu

Platinum Member
Aug 22, 2014
2,387
2
41
Even if you did get the password your next best bet it may have been a company laptop then perhaps having TPS encryption enabled in the bios and the drive would be encrypted.

Best thing for you is to buy one more laptop same model and use this current one as a spare for parts. then throw away the motherboard away.
 

Gunbuster

Diamond Member
Oct 9, 1999
6,852
23
81
You could buy a new motherboard on ebay, but they are around $200.

Learned a lesson about buying company laptops at yard sales?
 

Evander

Golden Member
Jun 18, 2001
1,159
0
76
Some computers/bios have unpublicized methods on how to do a blind BIOS reflash in the event of a bad flash. A side effect would be erasing the password. I have a 2007 Acer laptop with Phoenix bios for instance that (supposedly, I haven't had to try it) lets the user recover from a bad flash by copying a bios file onto a floppy disk and using a certain combination of keystrokes on start up, the computer "knows" to perform a reflash (accessible only by a USB floppy drive).

That might be an option here - only thing I've done remotely similar was reflash an IDE DVD-RW drive a while back that wouldn't be recognized by the computer due to bad firmware flash: had to attach power cables to the bad drive & known good drive and ribbon cable to good drive only, power up system, run firmware flasher program up to the point "press key to flash", swap the ribbon cable to bad drive, and perform flash.
 

Steltek

Diamond Member
Mar 29, 2001
3,308
1,046
136
Some computers/bios have unpublicized methods on how to do a blind BIOS reflash in the event of a bad flash. A side effect would be erasing the password. I have a 2007 Acer laptop with Phoenix bios for instance that (supposedly, I haven't had to try it) lets the user recover from a bad flash by copying a bios file onto a floppy disk and using a certain combination of keystrokes on start up, the computer "knows" to perform a reflash (accessible only by a USB floppy drive).

That might be an option here - only thing I've done remotely similar was reflash an IDE DVD-RW drive a while back that wouldn't be recognized by the computer due to bad firmware flash: had to attach power cables to the bad drive & known good drive and ribbon cable to good drive only, power up system, run firmware flasher program up to the point "press key to flash", swap the ribbon cable to bad drive, and perform flash.

What you are describing won't work for this issue. The BIOS password is stored in encrypted NVRAM which is separate from the BIOS. Flashing the BIOS thus has no effect on the stored passwords in the NVRAM.
 

pcgeek11

Lifer
Jun 12, 2005
22,100
4,886
136
It has been registered by Dell To the original purchaser with the service tag. They will not help you if it was not transferred to you in their system.
 

schmuckley

Platinum Member
Aug 18, 2011
2,335
1
0
Some BIOS flashers clear NVRAM.
I know AFUDOS does.
Your situation is a bit more complicated, though.
You will probably need a dvd/flash drive with the right tools.
If the eeprom is removable..buy a new one :D
 

pcgeek11

Lifer
Jun 12, 2005
22,100
4,886
136
The EEPROM is not removable and I'd be willing to bet it is probably on the back side of the MB. Dell usually doesn't make this an easy process. It is to prevent theft, and it works in the sense that if the system is password protected when it is stolen they will not be able to easily get past it. The kicker is Dell will not assist unless the original owner transfers ownership to you through them. That has been my experience with Dell. So barring getting a hold of the right software to reset the EEPROM, or getting the registered owner to help you, you now have a very good paperweight.
 

corkyg

Elite Member | Peripherals
Super Moderator
Mar 4, 2000
27,370
239
106
IMHO, Dell is absolutely right if this is their policy. They are protecting unwary consumers from fraud and theft. Why is it assumed that the "fly by night" e-Bay seller came by the item lawfully? When a business disposes of protected equipment, they should clean it up to include any passwords, BIOS or OS. If they did not, then the recourse is to go back to them and get it done.
 

alkemyst

No Lifer
Feb 13, 2001
83,769
19
81
This kind of security is to keep those in the office or those quickly trying to pry out.

It should be layered with other methods.

That said when one has physical access, most electronic devices can be defeated.
 
Status
Not open for further replies.