How to remove/erase your BIOS/CMOS Password on Windows, Ubuntu/Linux , BSD platforms

BIOS password is stored in a non-erasable part of the CMOS ('BIOS memory'). If you have forgotten the Bios/CMOS password on your laptop/desktop, here is one 5-minutes-solution to remove it.
This solution was working for me on a Linux environment, Ubuntu 9.10 - Karmic Koala and is also working on a Windows, BSD environment.
CMOS is a type of battery-powered chip that holds data without requiring an external power source. In a laptop/desktop, CMOS holds the basic instructions the computer needs to initialize its hardware components and boot up. These settings are known as the basic input output system (BIOS) or CMOS settings.
Before trying to figure out where is your CMOS located and how would you safety remove it for 30 minutes, as a solution to erase your Bios Password, or finding out what is the backdoor password for your computer - some BIOS’ have pre-installed backdoor passwords, you can succeed using the CMOS password recovery tool 5.0. This tool works in Windows, Linux and BSD platforms.

For Windows follow those steps (you need to have administrator privilege):
1.Download the CMOS password recovery tool 5.0 freeware here;
2.Unzip the file;
3.Install ioperm driver - that gives direct port I/O access for specified ports to user-mode process – “ioperm.exe -i”;
4.Ioperm has to be running, start the service with “net start ioperm";
5.Run "Cmospwd_win.exe" file;
6.Restart your computer, press F2/other key to access your BIOS menu without any password.
The old password is erased and that took you less than 5 minute.
7.Uninstall the ioperm driver with "ioperm.exe -u", to increase your security.

For Linux/BSD follow those steps (you need to have root privilege):
1.Download the CMOS password recovery tool 5.0 freeware here;
2.Uncompress/untar your Tar file;
3.Open a terminal and write the commands to locate your file;
4. You have a few command options:
cmospwd /d ---> to dump cmos in ascii and scan code
cmospwd [/d] /[wlr] ---> cmos_backup_file write/load/restore
cmospwd /k ---> kill cmos
cmospwd /m0010011 ---> to execute module 3,6 and 7

If you chose “cmospwd /k “ as I did, you will have 3 options:
1 - kill cmos (also the date and time , this can be adjusted later);
2- kill cmos (keeping the date and time);
0 - abort ;
Your password is erased and you can access your Bios again.
Success!

No comments: