Announcement

Collapse
No announcement yet.

Bios unlock for Asus Vivobook X513EA

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Bios unlock for Asus Vivobook X513EA

    Hello everyone,

    The situation is as follows:
    I set a supervisor password for my bios and forgot it because my laptop boots directly into Windows. So apparently there is no need to remember the password, my brain thought, so here I am

    System Specs:
    • Operating System: Windows 11 Pro 64-bit (10.0, Build 26100) (26100.ge_release.240331-1435) (Updated from original Windows 11 Home to 11 Pro using a key)
    • System Manufacturer: ASUSTeK COMPUTER INC.
    • System Model: VivoBook_ASUSLaptop X513EA_K513EA
    • BIOS: X513EA.310 (Type: UEFI)
    • Processor: 11th generation Intel(R) Core(TM) i5-1135G7 @ 2.40GHz (8-core), ~2.4GHz
    Further Information:
    • Storage Device: Type SPI
    • RPMC Replay Protection Max Rebind 15
    • BIOS Read Access 0x000F
    • BIOS Write Access 0x000A
    • GBE Read Access 0x0009
    • GBE Write Access 0x0008
    • ME Read Access 0x000D
    • ME Write Access 0x0004
    • EC Read Access 0x0101
    • EC Write Access 0x0100

    I read the topics on badcaps and win-raid to gather as much information as possible to dump my bios into a file (and succeeded?). I have attached the dump files. One was created with afuwinx64.exe and the other with Intel's fptw64.exe. I also checked the checksums of some of the files generated and they are identical (so hopefully no mistake there).

    I tried to decrypt the pw using the https://www.badcaps.net/forum/troubl...=2#post1544866 guide, but failed.

    Click image for larger version  Name:	Screenshot 2025-01-11 215513.png Views:	0 Size:	29.0 KB ID:	3546482

    When I run the AMITSEDecrypt.py file, I get a "weird" decrypted password (it does not work)

    TLDR:

    My request: Could one of you please look at these bios dump files and decrypt the passwords (or tell me if they are completely wrong)?

    Kind regards




    #2
    Originally posted by electrono View Post
    Hello everyone,

    The situation is as follows:
    I set a supervisor password for my bios and forgot it because my laptop boots directly into Windows. So apparently there is no need to remember the password, my brain thought, so here I am

    System Specs:
    • Operating System: Windows 11 Pro 64-bit (10.0, Build 26100) (26100.ge_release.240331-1435) (Updated from original Windows 11 Home to 11 Pro using a key)
    • System Manufacturer: ASUSTeK COMPUTER INC.
    • System Model: VivoBook_ASUSLaptop X513EA_K513EA
    • BIOS: X513EA.310 (Type: UEFI)
    • Processor: 11th generation Intel(R) Core(TM) i5-1135G7 @ 2.40GHz (8-core), ~2.4GHz
    Further Information:
    • Storage Device: Type SPI
    • RPMC Replay Protection Max Rebind 15
    • BIOS Read Access 0x000F
    • BIOS Write Access 0x000A
    • GBE Read Access 0x0009
    • GBE Write Access 0x0008
    • ME Read Access 0x000D
    • ME Write Access 0x0004
    • EC Read Access 0x0101
    • EC Write Access 0x0100

    I read the topics on badcaps and win-raid to gather as much information as possible to dump my bios into a file (and succeeded?). I have attached the dump files. One was created with afuwinx64.exe and the other with Intel's fptw64.exe. I also checked the checksums of some of the files generated and they are identical (so hopefully no mistake there).

    I tried to decrypt the pw using the https://www.badcaps.net/forum/troubl...=2#post1544866 guide, but failed.

    Click image for larger version Name:	Screenshot 2025-01-11 215513.png Views:	0 Size:	29.0 KB ID:	3546482

    When I run the AMITSEDecrypt.py file, I get a "weird" decrypted password (it does not work)

    TLDR:

    My request: Could one of you please look at these bios dump files and decrypt the passwords (or tell me if they are completely wrong)?

    Kind regards


    Come here


    Click image for larger version  Name:	Screenshot 2025-01-11 215513.png Views:	0 Size:	29.0 KB ID:	3546594


    ----------------------------------------------------------------------------------------------------------------------------------------------------------
    All donations to Badcaps are welcome.
    Become a Badcaps supporter
    >>>>> click on this link to donate <<<<<
    Thanks to all supporters.
    ----------------------------------------------------------------------------------------------------------------------------------------------------------​

    Comment


      #3
      Hi, thanks for getting in touch.
      So, the first input password would be "7D 46 D3 1A 4B 5A 71 DD B4 5A 6A 54 22 E2 41 E7 7F 01 87 E1 C7 C1 64 29 15 71 E0 E8 F2 91 12 DC" (without the spaces). How do I trim the other input to decrypt the password? I've tried trimming the second input at the front and back, but output contains ASCII characters that are not printable

      TLDR: I've tried XORing, but no luck http://xor.pw/
      7D 46 D3 1A 4B 5A 71 DD B4 5A 6A 54 22 E2 41 E7 7F 01 87 E1 C7 C1 64 29 15 71 E0 E8 F2 91 12 DC
      5B 93 B6 26 11 BA 6C 4D C7 E0 22 74 7D 07 D8 9A 33 2E 8E C1 E9 54 44 E8 9F 7B FA 0E 55 A2 B0 35



      7D 46 D3 1A 4B 5A 71 DD B4 5A 6A 54 22 E2 41 E7 7F 01 87 E1 C7 C1 64 29 15 71 E0 E8 F2 91 12 DC
      C7 E0 22 74 7D 07 D8 9A 33 2E 8E C1 E9 54 44 E8 9F 7B FA 0E 55 A2 B0 35 0B C9 66 5C C1 EF 1C 83 (spaces are a little messed up)

      Decrypt code:

      5B93B62611BA6C4DC7E022747D07D89A332E8EC1E95444E89F7BFA0E55A2B0350BC9665CC1EF1C83

      Error:
      In the output string, there are ASCII characters that are not printable. Use another output type to view the complete output.

      Got any other ideas?

      Comment


        #4
        Originally posted by electrono View Post
        Hi, thanks for getting in touch.
        So, the first input password would be "7D 46 D3 1A 4B 5A 71 DD B4 5A 6A 54 22 E2 41 E7 7F 01 87 E1 C7 C1 64 29 15 71 E0 E8 F2 91 12 DC" (without the spaces). How do I trim the other input to decrypt the password? I've tried trimming the second input at the front and back, but output contains ASCII characters that are not printable

        TLDR: I've tried XORing, but no luck http://xor.pw/
        7D 46 D3 1A 4B 5A 71 DD B4 5A 6A 54 22 E2 41 E7 7F 01 87 E1 C7 C1 64 29 15 71 E0 E8 F2 91 12 DC
        5B 93 B6 26 11 BA 6C 4D C7 E0 22 74 7D 07 D8 9A 33 2E 8E C1 E9 54 44 E8 9F 7B FA 0E 55 A2 B0 35



        7D 46 D3 1A 4B 5A 71 DD B4 5A 6A 54 22 E2 41 E7 7F 01 87 E1 C7 C1 64 29 15 71 E0 E8 F2 91 12 DC
        C7 E0 22 74 7D 07 D8 9A 33 2E 8E C1 E9 54 44 E8 9F 7B FA 0E 55 A2 B0 35 0B C9 66 5C C1 EF 1C 83 (spaces are a little messed up)

        Decrypt code:

        5B93B62611BA6C4DC7E022747D07D89A332E8EC1E95444E89F7BFA0E55A2B0350BC9665CC1EF1C83

        Error:
        In the output string, there are ASCII characters that are not printable. Use another output type to view the complete output.

        Got any other ideas?
        This password cannot be decrypted, for now. You can remove it but you should have a programmer to extract the entire bios file.


        ----------------------------------------------------------------------------------------------------------------------------------------------------------
        All donations to Badcaps are welcome.
        Become a Badcaps supporter
        >>>>> click on this link to donate <<<<<
        Thanks to all supporters.
        ----------------------------------------------------------------------------------------------------------------------------------------------------------​

        Comment


          #5
          Hey,

          I've got some more stuff to post. I took my laptop apart and managed to identify the BIOS chip (see attached picture). I haven't looked at the back of my motherboard yet, but I reckon this is the chip I'm looking for. Do you think you could take a look and let me know if I'm right?

          My baseboard is as follows: ASUSTeK COMPUTER INC. X513EA M938NBCV00U06EMB 1.0

          I've found an eBay listing with a picture of the whole motherboard: https://www.ebay.de/itm/266902106201

          How I would proceed:

          I've bought the CH4131A programmer and will read the BIOS chip with it.

          Best regards!
          Attached Files

          Comment


            #6
            Originally posted by electrono View Post
            Hello everyone,

            The situation is as follows:
            I set a supervisor password for my bios and forgot it because my laptop boots directly into Windows. So apparently there is no need to remember the password, my brain thought, so here I am

            System Specs:
            • Operating System: Windows 11 Pro 64-bit (10.0, Build 26100) (26100.ge_release.240331-1435) (Updated from original Windows 11 Home to 11 Pro using a key)
            • System Manufacturer: ASUSTeK COMPUTER INC.
            • System Model: VivoBook_ASUSLaptop X513EA_K513EA
            • BIOS: X513EA.310 (Type: UEFI)
            • Processor: 11th generation Intel(R) Core(TM) i5-1135G7 @ 2.40GHz (8-core), ~2.4GHz
            Further Information:
            • Storage Device: Type SPI
            • RPMC Replay Protection Max Rebind 15
            • BIOS Read Access 0x000F
            • BIOS Write Access 0x000A
            • GBE Read Access 0x0009
            • GBE Write Access 0x0008
            • ME Read Access 0x000D
            • ME Write Access 0x0004
            • EC Read Access 0x0101
            • EC Write Access 0x0100

            I read the topics on badcaps and win-raid to gather as much information as possible to dump my bios into a file (and succeeded?). I have attached the dump files. One was created with afuwinx64.exe and the other with Intel's fptw64.exe. I also checked the checksums of some of the files generated and they are identical (so hopefully no mistake there).

            I tried to decrypt the pw using the https://www.badcaps.net/forum/troubl...=2#post1544866 guide, but failed.

            Click image for larger version Name:	Screenshot 2025-01-11 215513.png Views:	0 Size:	29.0 KB ID:	3546482

            When I run the AMITSEDecrypt.py file, I get a "weird" decrypted password (it does not work)

            TLDR:

            My request: Could one of you please look at these bios dump files and decrypt the passwords (or tell me if they are completely wrong)?

            Kind regards


            HERE
            Attached Files

            Comment


              #7
              Thank you.
              You are right. You have "erased" the data by writing zeros into it. However, flashing this file with fptw64.exe is not possible because of the bios protected regions. I would do this with the programmer (after some experimentation on a bricked laptop I got)

              I have another question:

              Is it possible to flash the latest bios compatible with my motherboard from Asus? See this link: https://www.asus.com/searchresult?se...0K513EA&page=1


              Edit: But back to the main topic: Is the chip the right one?

              Comment

              Working...
              X