Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

BIOS Lockout on Dell Laptop


  • Please log in to reply
9 replies to this topic

#1 scurvychef

scurvychef

  • Members
  • 182 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Western NY
  • Local time:04:33 AM

Posted 29 September 2011 - 02:01 AM

I bought a used/parts D820 Lattitude off Ebay. Nice little machine. had no screen and a password on BIOS. I wish I would have known what all this "password" entailed. I put a screen in it and TRIED to reset the password. Here is all I have done so far:

1. Pulled the CMOS battery (no luck)

2. Called Dell, and after being on the phone with them FOREVER they give me an "master password" and after that doesn't work they tell me I can buy a new Motherboard for $498!!!!!!!

3. I torn the machine down hopelessly looking for a chip to jump. No luck

4. Googled the issue (which ran me in a loop) looking for a .iso file called "dst cd" Nothing but a bunch of links to malware and BS like that. (I didn't think it would boot from a CD anyway because BIOS is locked) but read the testimonials and figured "what the hey?"

5. Tried to boot a Hiren's disk. Didn't work. The "dst cd" myth is BS.

6. Called Dell and gave the Ol' difficult caller routine. Talked to supervisor. Received "another code" but I think it was random BS they said to get me to shut up because it didn't work either


I am very disgruntled with this laptop but refuse to believe that the MoBo is bad because of a PASSWORD!!! CAN ANYONE HELP ME PLEASE!!??

BC AdBot (Login to Remove)

 


#2 killerx525

killerx525

    Bleepin' Aussie


  • Members
  • 7,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Melbourne, Australia
  • Local time:08:33 PM

Posted 29 September 2011 - 02:38 AM

Have you asked the seller for the password?

>Michael 
System1: CPU- Intel Core i7-5820K @ 4.4GHz, CPU Cooler- Noctua NH-D14, RAM- G.Skill Ripjaws 16GB Kit(4Gx4) DDR3 2133MHz, SSD/HDD- Samsung 850 EVO 250GB/Western Digital Caviar Black 1TB/Seagate Barracuada 3TB, GPU- 2x EVGA GTX980 Superclocked @1360/MHz1900MHz, Motherboard- Asus X99 Deluxe, Case- Custom Mac G5, PSU- EVGA P2-1000W, Soundcard- Realtek High Definition Audio, OS- Windows 10 Pro 64-Bit
Games: APB: Reloaded, Hours played: 3100+  System2: Late 2011 Macbook Pro 15inch   OFw63FY.png


#3 scurvychef

scurvychef
  • Topic Starter

  • Members
  • 182 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Western NY
  • Local time:04:33 AM

Posted 29 September 2011 - 11:19 AM

Hey Killer! thanks for you prompt response. Well, I would have asked them but I figured they were a reseller and didn't know it themselves. That is why I scored it for so cheap.

On that note my problem is resolved now. right before giving up and going to bed i decided to type my model number and "BIOS password" into the ebay search and see what serviced were available. So, for a couple dollars I hired a hacker to break the master password using the service tag number. WELL WORTH THE COST!!!! He emailed me back within 6 hours and now the computer is running next to me.

Thank you all for reading my post and hopefully someone else will find this thread useful and not spend hours like I did looking for chip jumpers, disconnecting the battery, getting ripped off by Dell... ect...

#4 Eyesee

Eyesee

    Bleepin Teck Shop


  • BC Advisor
  • 3,540 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:In the middle of Kansas
  • Local time:04:33 AM

Posted 29 September 2011 - 11:58 AM

What guarantee do you have that your "hacker" hasnt now hacked into your system?
In the beginning there was the command line.

#5 hamluis

hamluis

    Moderator


  • Moderator
  • 55,384 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:04:33 AM

Posted 29 September 2011 - 04:20 PM

FWIW: The system manual would have told you how to bypass/reset the password.

Louis

#6 killerx525

killerx525

    Bleepin' Aussie


  • Members
  • 7,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Melbourne, Australia
  • Local time:08:33 PM

Posted 29 September 2011 - 07:44 PM

That hacker sounds dodgy.

>Michael 
System1: CPU- Intel Core i7-5820K @ 4.4GHz, CPU Cooler- Noctua NH-D14, RAM- G.Skill Ripjaws 16GB Kit(4Gx4) DDR3 2133MHz, SSD/HDD- Samsung 850 EVO 250GB/Western Digital Caviar Black 1TB/Seagate Barracuada 3TB, GPU- 2x EVGA GTX980 Superclocked @1360/MHz1900MHz, Motherboard- Asus X99 Deluxe, Case- Custom Mac G5, PSU- EVGA P2-1000W, Soundcard- Realtek High Definition Audio, OS- Windows 10 Pro 64-Bit
Games: APB: Reloaded, Hours played: 3100+  System2: Late 2011 Macbook Pro 15inch   OFw63FY.png


#7 scurvychef

scurvychef
  • Topic Starter

  • Members
  • 182 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Western NY
  • Local time:04:33 AM

Posted 30 September 2011 - 10:04 AM

I dunno. It worked great though. I guess the guy bought a program that generates passwords based on the service tag number. He sent me the link to the site he bought it. I guess he figured I have this problem a lot? It is a good tool for pawn shop owners or second hand dealers I suppose.
Here is the link: http://www.ebay.com/itm/Bios-password-Unlock-dell-latitude-D830-D820-D810-D800-/220765947618?pt=LH_DefaultDomain_0&hash=item3366ad06e2

I don't have a manual unfortunately. Thanks all!

#8 Rivertown Networking

Rivertown Networking

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:04:33 AM

Posted 18 August 2012 - 12:34 PM

You are entirely wrong about the Dell DST cd being a myth. I used to work for Dell and have used it for years to clear BIOS passwords on basically any Dell laptop. Here is the readme from the actual DST CD. Just because you couldn't figure it out doesn't mean it is a myth. I am glad you got it fixed but it sucks you had to pay for it. Unfortunately the DST cd has been leaked onto the Internet along with anyone else so BIOS passwords are as simple to bypass as booting to a cd and clearing it. Maybe you got a bad copy. I've never tried it w/ any boot cd other than the actual Dell boot disc and it has never failed.

SVCTAG.EXE

**********************************************************
Dell Internal Use Only
NOT FOR EXTERNAL DISTRIBUTION
**********************************************************


What does this utility do?
----------------------------------------------------------------------
This utility is used to re-program the system service tag on certain
Dell Portable systems. The utility may only work on systems which
already have a service tag programmed. If no service tag currently
exists, the utility may return an error message and fail.

To program the service tag on a system that does not already have one:

- For Value-line systems:
Run EE-Value.exe /S=XXXXXXX, where XXXXXXX is alphanumeric and all
letters are capitalized.

- For SmartStep/Smart PC 200N/250N:
Run STAG_W1.EXE /W XXXXXXX, where XXXXXXX is alphanumeric and all
letters are capitalized.

- For Molokai:
Run SERTAG.exe /W XXXXXX, where XXXXXX is alphanumeric and all
letters are capitalized.

- For all other systems:
Run ASSET.COM /S XXXXXXX, where XXXXXXX is the new service tag.


USAGE:
----------------------------------------------------------------------
Boot from the diskette and follow the on-screen prompts to erase and
program a new service tag.

See the comments in AUTOEXEC.BAT on how to automate the process.


General Information:
----------------------------------------------------------------------
This diskette contains 6 main programs or program types:
1. SVCTAG.EXE
2. 6 varieties of EE-ERASE
- EE-CP.EXE
- EE-CPA.EXE
- EE-CPB.EXE
- EE-LS.EXE
- EE-LS2.EXE
- EE-VALUE.EXE
- STAG.EXE
- STAG_W1.EXE
3. 3 varieties of ASSET
- ASSET.COM
- EE-VALUE.EXE
- STAG_W1.EXE
4. NICSET.EXE
5. FDD_RCL.EXE
6. SVCTAG.INF

1. SVCTAG.EXE is called from autoexec.bat. It is a utility that
determines if the system on which it is being executed is supported
by the disk. If so, it determines which type of system it is, using
the system ID byte. This information is gathered from either SMBOIS
calls or XBIOS calls, if SMBIOS fails. The utility also uses these
calls to determine if a service tag is currently programmed on the
system. If one isn't programmed, there is no need to run EE-ERASE
so the utility goes directly to the ASSET program.

2. Based on the information gathered, SVCTAG.EXE launches the
appropriate version of EE-Erase.

Each of these utilities can be run stand-alone. For EE-CPA.EXE, the
-forcetype command line switch may be required.

3. The appropriate version of ASSET program is then launched.
SVCTAG.EXE first asks the user the enter the new service tag (twice
for verification) then passes that value to ASSET when it is
launched.

The ASSET programs can be run as a stand-alone utilities as noted
above.

4. NICSET.EXE is launched by SVCTAG.EXE after EE_ERASE if the system
is a Latitude C610 or Inspiron 4100. NICSET is needed in order to
unhide and enable the onboard NIC, which is disabled by EE-ERASE.

5. FDD_RCL.EXE is the launched from AUTOEXEC.BAT after SVCTAG.EXE. It
performs a Recalibrate operation on the floppy diskette drive.
The purpose of this utility is to ensure the FDD head is moved to
track 0 in preperation for transport.
It is important to power off the system immediately after this
utility is run in order to guarantee the head remains at track 0.

6. SVCTAG.INF is the text file contains vendor name, system id, ee-erase,
erase options, asset and asset options. This file is processed
by svctag.exe. The program goes through this file line by line
and searches for system id and BIOS vendor string which match the
system ID and BIOS vendor string read from the system on which
the utility is being run. If a match is found, the corresponding
line will be parsed and the executables and command line options
from that line will be used to erase and program the service tag.


======================================================================


Supported Systems

All Dell Portable Systems

======================================================================

#9 ShadowGato

ShadowGato

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:05:33 AM

Posted 19 October 2017 - 08:02 PM

Hi Folks, New here, but thought this could help some people. Thanks for all the info here I recovered a dell XPS14 although not directly. I used an older version DSTCD.ISO that did not support the xps14, hoever the EE-LS2.exe tool was still able to read the eeprom and return the passwords (master and user) in clear text. 

 

Hope this helps someone.

 

 



#10 mjd420nova

mjd420nova

  • Members
  • 1,704 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:33 AM

Posted 19 October 2017 - 09:26 PM

I stumbled on this too but found that simply removing the CMOS battery wasn't enough,  I also have added a short alligator to alligator clip to short the battery terminals as some units have some capacitance and can hold a charge.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users