Davide Manzoni scrive:
>questo articolo e' una buona >introduzione e presenta anche qualche link di aziende che sono capaci di >farlo: >http://www.itsecurityjournal.com/content/view/38/1/ Riporto parte dell'articolo suddetto : Another technique that works on some systems involves using a second unlocked disk drive to fool the controlling software and allow the password on a locked disk to be changed. The general procedure is to remove the locked hard disk from the computer and replace it with an unlocked hard disk. The computer is then rebooted and a password is set on the hard disk. The next step involves going into the configuration area again and entering the command to change the password. After the system prompts for the current password to authenticate the change, the system will prompt for the new password. At that point the hard drive is removed while the system is running and the other hard drive, with the unknown password, is installed in its place. After that is done, the command is issued to change the password, which resets the password on the original locked drive to a known value. Quante sono le possibilita' di bruciare l'hd incriminato visto che la sostituzione deve essere fatta a caldo? An alternate method to bypass the password protection is much more involved and requires the right equipment and a special clean room, but it works on every disk drive. In this approach the seal is broken on the password-protected hard drive, the case opened and the hard disk platters removed. The platters are then reassembled in another hard drive where the password is known or disabled. Questo mi fa dedurre che sostituendo la logica dell'hd otterrei lo stesso risultato! sbaglio?
________________________________________________________ http://www.sikurezza.org - Italian Security Mailing List
