Davide Manzoni scrive:

>questo articolo e' una buona
>introduzione e presenta anche qualche link di aziende che sono capaci di
>farlo:

>http://www.itsecurityjournal.com/content/view/38/1/

Riporto parte dell'articolo suddetto :

Another technique that works on some systems involves using a second unlocked 
disk drive to fool the controlling software and allow the password on a 
locked disk to be changed. The general procedure is to remove the locked hard 
disk from the computer and replace it with an unlocked hard disk. The 
computer is then rebooted and a password is set on the hard disk. The next 
step involves going into the configuration area again and entering the 
command to change the password. After the system prompts for the current 
password to authenticate the change, the system will prompt for the new 
password. At that point the hard drive is removed while the system is running 
and the other hard drive, with the unknown password, is installed in its 
place. After that is done, the command is issued to change the password, 
which resets the password on the original locked drive to a known value.


Quante sono le possibilita' di bruciare l'hd incriminato visto che la 
sostituzione deve essere fatta a caldo?

An alternate method to bypass the password protection is much more involved 
and requires the right equipment and a special clean room, but it works on 
every disk drive. In this approach the seal is broken on the 
password-protected hard drive, the case opened and the hard disk platters 
removed. The platters are then reassembled in another hard drive where the 
password is known or disabled.


Questo mi fa dedurre che sostituendo la logica dell'hd otterrei lo stesso 
risultato! sbaglio?
________________________________________________________
http://www.sikurezza.org - Italian Security Mailing List

Rispondere a