eleventh alliance

!BIOS PC BIOS Security and Maintanance toolkit

!Bios is a tool originally developed for a brute, blunt removal of passwords from BIOSes. Through it’s development it has been severly extended, and Eleventh Alliance have now recieved emails from computer support divisions, hackers and not least of all ordinary computer users who has expressed gratitude for what they consider one of the best toolkits available.Features:

  • !Bios can decrypt the passwords used in some most common BIOS (including various bioses/versions by IBM, American Megatrends Inc, Award and Phoenix).
  • !Bios can also save and restore the IBM standard CMOS/NVRAM memory where almost all common Bioses store the BIOS setup settings.
  • !Bios can save the part of the RAM dedicated for the BIOS (which has security implications in some BIOSes as encryption algorithms and/or password may actually reside here in some badly coded BIOSes).
  • !Bios can do crude, brutal attacks (“blasters”) which removes password from a lot of Bioses. A bit dangerous though, can give unexpected and unwanted results.
  • !Bios has a CMOS editor where you through a interface with similarities to several hex-editors can modify the CMOS/NVRAM memory in binary, decimal and hexadecimal ways. (only adviced for very experienced hackers)
  • !Bios has a command line interface (CLI) and a very simple VGA-text interface, GUI. If no parameters is passed to !Bios, it starts the easy-to-use GUI, otherwise it starts the GUI.
  • !Bios has built-in support pages which provides several tricks and tips, notes about known backdoors etc.

One of the best examples of these programs is a recently released program called “The Ultimate Bios Utility” put together by Eleventh Alliance – Quoth X3 in alt.2600

Media apperences: The german computer magazine C’t listed our site and our toolkit as one of the sources in their article about BIOS (in)security. (c’t article in english) The book “BIOS” from MicroApplication (ZD) mentions our program as the best one of it’s kind (according to emails sent to us, haven’t read it)

We wish to thank:

  • The ibiosdev mailinglist.
  • Everyone who has aided in the cryptanalysis
  • Everyone who has aided in the development/bugtraqing
  • Bugs and Jan Stohner who we have borrowed sources from.
  • All media who’s given our program positive media appearences.
  • Anyone who has sent email to us with their thanks.
  • White Ninja from Australia who sent us a postcard.
Comments (100) 1:13 am |