TIP: Click on subject to list as thread! ANSI
echo: 80xxx
to: SCOTT MCNAY
from: PETER MAGNUSSON
date: 1997-12-30 17:50:00
subject: Code in Boot Sector

 SM> Sure, just disassemble it.  Shouldnt take more than, say, a
 SM> few weeks... ;)
Well, you can combine various trix, CMOS dumps etc, and
make a good guess what kind of encryption that is used.
When you know that, seek for loops that use such
instructions. Then you found the password algorithm,
find out where it is called, what variables and calls
that are used near it...
Doens't have to take more than a day if you are lucky.
(if you're not, it could take a lifetime ;-)
I broke the Award checksum in an hour or less, and when
I disassembled the BIOS, I found the masterpassword
checksum in no time.
Besides, does anyone have a clue why AMI use unusual
opcodes? I mean, what's wrong with all the usual opcodes
that e.g TASM and the others usually produce ?
[peter]
--- FMail 1.02
---------------
* Origin: Server*7GB* D0S.0S2.WiN USR33600 0300-13564 (2:203/253)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.