Hello everyone,
The situation is as follows:
I set a supervisor password for my bios and forgot it because my laptop boots directly into Windows. So apparently there is no need to remember the password, my brain thought, so here I am
System Specs:
I read the topics on badcaps and win-raid to gather as much information as possible to dump my bios into a file (and succeeded?). I have attached the dump files. One was created with afuwinx64.exe and the other with Intel's fptw64.exe. I also checked the checksums of some of the files generated and they are identical (so hopefully no mistake there).
I tried to decrypt the pw using the https://www.badcaps.net/forum/troubl...=2#post1544866 guide, but failed.

When I run the AMITSEDecrypt.py file, I get a "weird" decrypted password (it does not work)
TLDR:
My request: Could one of you please look at these bios dump files and decrypt the passwords (or tell me if they are completely wrong)?
Kind regards

The situation is as follows:
I set a supervisor password for my bios and forgot it because my laptop boots directly into Windows. So apparently there is no need to remember the password, my brain thought, so here I am
System Specs:
- Operating System: Windows 11 Pro 64-bit (10.0, Build 26100) (26100.ge_release.240331-1435) (Updated from original Windows 11 Home to 11 Pro using a key)
- System Manufacturer: ASUSTeK COMPUTER INC.
- System Model: VivoBook_ASUSLaptop X513EA_K513EA
- BIOS: X513EA.310 (Type: UEFI)
- Processor: 11th generation Intel(R) Core(TM) i5-1135G7 @ 2.40GHz (8-core), ~2.4GHz
- Storage Device: Type SPI
- RPMC Replay Protection Max Rebind 15
- BIOS Read Access 0x000F
- BIOS Write Access 0x000A
- GBE Read Access 0x0009
- GBE Write Access 0x0008
- ME Read Access 0x000D
- ME Write Access 0x0004
- EC Read Access 0x0101
- EC Write Access 0x0100
I read the topics on badcaps and win-raid to gather as much information as possible to dump my bios into a file (and succeeded?). I have attached the dump files. One was created with afuwinx64.exe and the other with Intel's fptw64.exe. I also checked the checksums of some of the files generated and they are identical (so hopefully no mistake there).
I tried to decrypt the pw using the https://www.badcaps.net/forum/troubl...=2#post1544866 guide, but failed.
When I run the AMITSEDecrypt.py file, I get a "weird" decrypted password (it does not work)
TLDR:
My request: Could one of you please look at these bios dump files and decrypt the passwords (or tell me if they are completely wrong)?
Kind regards

Comment