Skip to content

chris-pcguy/reveng-misc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

reveng-misc

Misc. Reverse Engineering Projects

gtasa.py - GTA:SA Trainer (Framework) for Linux
hp_bas.py - Cracking HP UEFI admin password
hp_hdd.py - Decode HP UEFI Automatic DriveLock password (xor rol xor)
a86_unlock.txt - Asus "The new PadFone Infinity" A86 (T004) Unlock Instructions and Recovering from "QHSUSB__BULK (9008)"
leontp_fw.py - Flash LeoNTP firmware
philips_atv_mem.py - Root Philips Android TV by (mis)using a backdoor

HP Probook 470 G1 UEFI L74 Ver. 01.47 from 2018-07-30 (latest, as of 2019-05-11):
HP's Automatic DriveLock is vulnerable to a hotplug attack. The DriveLock password gets sent to the harddisk before an user enters his password.
HP's Automatic DriveLock password is stored in the NVRAM variable "HP_AUTODL" (offset 0x14, len 0x20) and encoded with a weak "cipher". (xor 0x5a, rol 4, xor 0x66)
HP's UEFI admin password is converted to scancodes, hashed with SHA1 and stored in the NVRAM variable "HP_BIOSAdminScanCode"

Flipper Zero workaround for some undetectable iButtons: 4.4k pull-up resistor between 3.3V and 1W (pins 9 and 17). YMMV.

About

Misc. Reverse Engineering Projects

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages