|
|
Remove BIOS passwords - SONY VAIO
In the newer SONY VAIO Notebooks, the BIOS password is no longer stored in the volatile CMOS-area but on an EEPROM. Jean Delvare has published
his results of an
analysis of various Sony Vaio EEPROM dumps on his
homepage. There you can see
that the BIOS password is stored encrypted in the first 7 Bytes of the EEPROM
and, if no password is set, these Bytes are 00h. So if you delete the whole chip
- like you can do with DELL notebooks - you should get rid of the password. If you are still able to boot up the
notebook, but only can't get into the BIOS setup, you can approach the password
the following way:
The file SMBUS57.DAT created by GETSMBUS.EXE contains a complete dump of the EEPROM at address 0x57 - in 99% the SONY VAIO chip. The EEPROM can be read easily through the so-called SMBus. Usually the SMBus is used to query e.g. the RAM-modules for Vendor and Speed-Infos (they have a similar EEPROM). Also temperatures and fan-speeds can be read through the SMBus. Now you have the encrypted password
and only have to decrypt it. Decrypt the
password Here is a
small Program which is able to parse the
file SMBUS57.DAT or even query the SMBus directly. From the obtained data it
shows information about the SONY Vaio-notebook - even the password(s). Here is a
screen-shot: By the way: this is an interior view
of a SONY VAIO Z1: (The DIP-switches below the keyboard are probably for setting the used TFT-panel. You can not delete the password with them anyway!) And this is a naked SONY VAIO V505: |
All trademarks and copyrights on the CD's are owned by their respective companies. Questions or problems regarding this web site
should be directed to [online form]. __________________ |