SM> Sure, just disassemble it. Shouldnt take more than, say, a
SM> few weeks... ;)
Well, you can combine various trix, CMOS dumps etc, and
make a good guess what kind of encryption that is used.
When you know that, seek for loops that use such
instructions. Then you found the password algorithm,
find out where it is called, what variables and calls
that are used near it...
Doens't have to take more than a day if you are lucky.
(if you're not, it could take a lifetime ;-)
I broke the Award checksum in an hour or less, and when
I disassembled the BIOS, I found the masterpassword
checksum in no time.
Besides, does anyone have a clue why AMI use unusual
opcodes? I mean, what's wrong with all the usual opcodes
that e.g TASM and the others usually produce ?
[peter]
--- FMail 1.02
---------------
* Origin: Server*7GB* D0S.0S2.WiN USR33600 0300-13564 (2:203/253)
|