Hello everyone! I am not looking for a ready-made solution, but I am looking for advice and help to understand the principles. We have a problem: UEFI password. We have a dump from the SPI BIOS (version .204) and an update file from the official website of the same version. In the BIOS region of the original dump, there are two NVRAM areas at the beginning that contain DMI and certificates (and most likely a password). In the BIOS region of the update file, the NVRAM area is only one. By what principle is a ready BIOS region formed from such an update file? When manually deleting the scripts in the HEX editor, I get a shift of 64 bytes to 00D376B0. I tried to use the BIOSUtilities scripts, but unfortunately nothing works, only errors appear in the console.
Announcement
Collapse
No announcement yet.
Asus Zenbook 14X UX3404VA (UX3404_MB) password request
Collapse
X
-
Originally posted by Wolfrahm View PostSN: R4N0LP03999317A
----------------------------------------------------------------------------------------------------------------------------------------------------------
All donations to Badcaps are welcome.
Become a Badcaps supporter
>>>>> click on this link to donate <<<<<
Thanks to all supporters.
----------------------------------------------------------------------------------------------------------------------------------------------------------
Comment
-
Originally posted by hoaca388 View Post
Admin Password : Toxa1989L
Comment
-
Originally posted by Wolfrahm View Post
Thank you Legend! But this is a ready-made solution... I will not ask how the password is decrypted from the dump, but I have questions about how to asseble the BIOS region from such an update file? Since this is the first time I am dealing with the update on Raptor Lake and the file structure is not typical for me.Attached Files
----------------------------------------------------------------------------------------------------------------------------------------------------------
All donations to Badcaps are welcome.
Become a Badcaps supporter
>>>>> click on this link to donate <<<<<
Thanks to all supporters.
----------------------------------------------------------------------------------------------------------------------------------------------------------
Comment
Comment