Hello, could someone help me to bypass an L14 GEN3 AMD?
Announcement
Collapse
No announcement yet.
Lenovo Thinkpad Ec Pwd Bypass
Collapse
X
-
Hello, I need help with a T14 Gen1 with a MEC 1663 and NM-931.
I watched the video but couldn't get the timings from the video. I have tried many many times and have gotten errors but still haven't gotten anything at all. Could you help out with the timings? Or is this impractical? Should I try to desolder the EC and replace it?
Cheers.
Comment
-
Originally posted by Halpert View PostHello, I need help with a T14 Gen1 with a MEC 1663 and NM-931.
I watched the video but couldn't get the timings from the video. I have tried many many times and have gotten errors but still haven't gotten anything at all. Could you help out with the timings? Or is this impractical? Should I try to desolder the EC and replace it?
Cheers.
Comment
-
Originally posted by Andreasbest View Post
In my case ( P52, T480s, T490s ) i found the correct timing at the beginning of Lenovo logo, very short and fast short to ground and all fine.
Cheers.
Comment
-
Originally posted by Halpert View Post
What did you use to ground? I'm trying to use a probe connected to a usb drive in the always on port and have gotten some errors, but is there a better way to do this?
Cheers.
Comment
-
hi good morning
i have lenovo yoga 6th gen motherboard part number is nm-d341 i have to remove bios password plz if any one have bypass point in this motherboard thanks
Comment
-
Originally posted by Usering View PostShare experience
1)
very Risk method lpc on espi board
killed 2 laptop cpu short
nm-d362 io mec1503
nm-981 io npcx997
I would have made a little money, now I would have paid over $500 for the board on aliexpress .
2)
regarding changing the chip, you must be a professional because the chip is glued from the inside with a black substance that can spoil the welding place and also the source of purchasing the chip.
Comment
-
Originally posted by rediii View Post
it won't work. the device is using the espi bus.
My humble opinion is that this not working has nothing to do with the eSPI itself basically by shorting the LPC or any bus at the time the bootloader tries to read the bios it makes it fail. this is actually patchable via software an I think if any laptop with an EC (even the ones that worked previously) has a updated FW it might not work.
This might need some serious reverse engineering, basically plug into the bus, listen and decode. the thing is while the previous versions with a ROM chip were encrypted the communication on the bus is most likely not. it takes time and experience, if someone is willing to collaborate I'm happy to give a hand with the HW side of things
Comment
-
Originally posted by ok escape View Post
I just started researching this today as I am looking to potentially buy some P1G6, have no schematic and no idea of what's inside but I'm tempted the test.
My humble opinion is that this not working has nothing to do with the eSPI itself basically by shorting the LPC or any bus at the time the bootloader tries to read the bios it makes it fail. this is actually patchable via software an I think if any laptop with an EC (even the ones that worked previously) has a updated FW it might not work.
This might need some serious reverse engineering, basically plug into the bus, listen and decode. the thing is while the previous versions with a ROM chip were encrypted the communication on the bus is most likely not. it takes time and experience, if someone is willing to collaborate I'm happy to give a hand with the HW side of things
the most elegant method would be to modify the main bios in a way, that the ec chip would erase or reset its eeprom content, so that the mainboard is like factory new. the u1 golden key tool is working with the newer thinkpad generations as well, so you can erase/reset the eeprom flash via initialization with the help of this tool.
i tried to modify the main and ec bios for hours (t15 g2i) and end up with nothing. thanks for the input though.
and i think you are right, the espi bus is most likely not the culprit, it's the logic design (new EC, EC AND MAIN BIOS + new bus system).
Comment
-
Originally posted by ok escape View Post
I just started researching this today as I am looking to potentially buy some P1G6, have no schematic and no idea of what's inside but I'm tempted the test.
My humble opinion is that this not working has nothing to do with the eSPI itself basically by shorting the LPC or any bus at the time the bootloader tries to read the bios it makes it fail. this is actually patchable via software an I think if any laptop with an EC (even the ones that worked previously) has a updated FW it might not work.
This might need some serious reverse engineering, basically plug into the bus, listen and decode. the thing is while the previous versions with a ROM chip were encrypted the communication on the bus is most likely not. it takes time and experience, if someone is willing to collaborate I'm happy to give a hand with the HW side of things
Comment
-
Originally posted by Usering View Post
I agree with you, because Victor, the Romanian Allservice team, uses a patch on UEFI to break the security BIOS, the new generation gen 2, gen 3, gen4, patch.
Comment
-
Originally posted by ok escape View Post
I just started researching this today as I am looking to potentially buy some P1G6, have no schematic and no idea of what's inside but I'm tempted the test.
My humble opinion is that this not working has nothing to do with the eSPI itself basically by shorting the LPC or any bus at the time the bootloader tries to read the bios it makes it fail. this is actually patchable via software an I think if any laptop with an EC (even the ones that worked previously) has a updated FW it might not work.
This might need some serious reverse engineering, basically plug into the bus, listen and decode. the thing is while the previous versions with a ROM chip were encrypted the communication on the bus is most likely not. it takes time and experience, if someone is willing to collaborate I'm happy to give a hand with the HW side of things
Comment
Comment