Hi, can somebody help me with CF-19 Mk3 (board number DFUP1718ZA) password remove, thanks.
Announcement
Collapse
No announcement yet.
CF-19 Mk3 (board number DFUP1718ZA) password
Collapse
X
-
Re: CF-19 Mk3 (board number DFUP1718ZA) password
@Jan0132
I was able to decode a password from your bios file, but by the characters in the password I'm in doubt if it will work or not... password is case-sensitive.
password = G :48(6F'
--------
G - GOLF ( UPPERCASE )
SPACE (press SPACE-BAR)
: - punctuation mark (colon)
4 - 4 ( digit )
8 - 8 ( digit )
( - punctuation mark (open-parenthesis)
6 - 6 ( digit )
F - FOXTROT ( UPPERCASE )
' - punctuation mark (single quotes)
--------
-
Re: CF-19 Mk3 (board number DFUP1718ZA) password
Originally posted by AAAC View Post@Jan0132
I was able to decode a password from your bios file, but by the characters in the password I'm in doubt if it will work or not... password is case-sensitive.
Comment
-
Re: CF-19 Mk3 (board number DFUP1718ZA) password
Originally posted by Jan0132 View PostHi, still need bios file without password, thanks!
------------------------------------------------------------
Admin Password: 3aprily2k
------------------------------------------------------------
Note that the User and/or Admin password are case sensitive.
Comment
-
Hi, i have a lot (about 100 pcs) of CF19 Mk3 Toughbooks with Modelnumber CF-19KHR88PE. The Bios ist passwort encrypted and the hdd encryption is still active.
Can anyone decode the passwort? I would be happy.
The Hex should be: 7E 13 96 A6 04 3A 7E CD FE 60 30 F4 5A 87 D8 9A 33 2E 8E C1 E9 54 44 E8 9F 7B FA 0E 55 A2 B0 35 0B C9 66 5C C1 EF 1C 83 77 16 D2 A9 2D 3D 88 D0
E3 63 3E F7 99 8A F4 1D 4F B1 AA 44 05 D8 60 6B 01
i already tryed to clear the hex values where the password is stored, but it dont work. Maybe i did something wrong.
Thank you very much.Attached Files
Comment
-
Originally posted by jasakl View PostHi, i have a lot (about 100 pcs) of CF19 Mk3 Toughbooks with Modelnumber CF-19KHR88PE. The Bios ist passwort encrypted and the hdd encryption is still active.
Can anyone decode the passwort? I would be happy.
The Hex should be: 7E 13 96 A6 04 3A 7E CD FE 60 30 F4 5A 87 D8 9A 33 2E 8E C1 E9 54 44 E8 9F 7B FA 0E 55 A2 B0 35 0B C9 66 5C C1 EF 1C 83 77 16 D2 A9 2D 3D 88 D0
E3 63 3E F7 99 8A F4 1D 4F B1 AA 44 05 D8 60 6B 01
i already tryed to clear the hex values where the password is stored, but it dont work. Maybe i did something wrong.
Thank you very much.
Comment
-
Originally posted by jasakl View PostHi, i have a lot (about 100 pcs) of CF19 Mk3 Toughbooks with Modelnumber CF-19KHR88PE. The Bios ist passwort encrypted and the hdd encryption is still active.
Can anyone decode the passwort? I would be happy
https://www.badcaps.net/forum/troubl...before-posting
You MUST:- Provide the full machine model number, serial number (or Service tag, SNID) and the board model number (see https://www.badcaps.net/forum/showthread.php?t=88758 ) ,The serial number, make, full model number, motherboard model and revision (except QR codes) must be written/typed at your request as per the rules. Not as a picture, part of the file name and so on.
Comment
-
Originally posted by jasakl View PostHi, i have a lot (about 100 pcs) of CF19 Mk3 Toughbooks with Modelnumber CF-19KHR88PE. The Bios ist passwort encrypted and the hdd encryption is still active.
Can anyone decode the passwort? I would be happy.
The Hex should be: 7E 13 96 A6 04 3A 7E CD FE 60 30 F4 5A 87 D8 9A 33 2E 8E C1 E9 54 44 E8 9F 7B FA 0E 55 A2 B0 35 0B C9 66 5C C1 EF 1C 83 77 16 D2 A9 2D 3D 88 D0
E3 63 3E F7 99 8A F4 1D 4F B1 AA 44 05 D8 60 6B 01
i already tryed to clear the hex values where the password is stored, but it dont work. Maybe i did something wrong.
Thank you very much.
Ok, sorry,
Machine number: CF-19KHR88PE
Serialnumber: 9JKSA15110
Boardnumber: DFUP1718ZB (1), 0PR03014, DL31u1718AAC, 2 MAIN 9J
Other numbers (maybe servicetag IDK):AB0123456789 9JKSA15110 T1304Y
I think all devices have the same passwort.
The Hex keys are idetical at Amitsesetupguid.
I share a other BIOS dump now (from a device i keep for passwort recovery), because my last dump is from a device which died recently.
All informations are from the same device.
Attached Files
Comment
-
@jasakl
I've checked both of your files, the password is hard-coded in the BIOS firmware, but at least the actual password could be recovered:
password = hancock
--------
h - hotel ( lowercase )
a - alfa ( lowercase )
n - november ( lowercase )
c - charlie ( lowercase )
o - oscar ( lowercase )
c - charlie ( lowercase )
k - kilo ( lowercase )
--------
Comment
-
Originally posted by AAAC View Post@jasakl
I've checked both of your files, the password is hard-coded in the BIOS firmware, but at least the actual password could be recovered:
password = hancock
--------
h - hotel ( lowercase )
a - alfa ( lowercase )
n - november ( lowercase )
c - charlie ( lowercase )
o - oscar ( lowercase )
c - charlie ( lowercase )
k - kilo ( lowercase )
--------
You saved my week.
Comment
Comment