How I Cracked The Sega ALLS MX2 BIOS Password

Sdílet
Vložit
  • čas přidán 20. 06. 2023
  • Original Sega ALLS video: • Sega Accidentally Made...
    For business inquiries, please email bringusstudios@intheblackmedia.com
    Ways you can be part of the Bringus Studios community and support the creation of new videos:
    Join the Discord:
    / discord
    Subscribe to Bringus Studios (my main channel):
    / @bringusstudios
    Check out my Patreon: I occasionally post exclusive videos here for my supporters, who also get access to every video early:
    www.patreon.com/user?u=78877687
    Buy me a coffee (one time donations):
    www.buymeacoffee.com/bringusstut
    Follow me on Twitch:
    / bringusstudios

Komentáře • 223

  • @__Ben
    @__Ben Před rokem +536

    The "units" for runtime_start and runtime_stop and epoch. you can convert them easily online but its basically the number ofseconds since Jan 1st 1970 00:00.
    Anyway, you started cracking at 2023-06-19 at 7:21:32 UTC and finished at 2023-06-19 at 7:44:06 UTC -- so it took about 23 minutes.

    • @renakunisaki
      @renakunisaki Před rokem +52

      This is called Unix Timestamp.

    • @Looki2000
      @Looki2000 Před rokem +31

      I just subtracted the first value from the second value, divided it by 60 and got 22,56

    • @BottomOfTheDumpsterFire
      @BottomOfTheDumpsterFire Před rokem +8

      ​@@Looki2000Yeah so 22 minutes and 34 seconds

    • @orclev
      @orclev Před rokem +15

      @@renakunisaki If you're going to be technical (which this is the internet, so we definitely are), it's a timestamp, whose epoch is the unix epoch, namely the start of Jan 1st 1970 in whatever timezone you've arbitrarily set it to (typically UTC). Since we only care about the delta between the two timestamps (to produce a duration rather than a timestamp) the timezone doesn't matter as long as both timestamps share the same timezone (which they do) and even the epoch doesn't matter as once again it's only important if they differ. Subtracting the start from the stop gives us a value of 1,354 seconds between them, or 22 minutes and 34 seconds.
      Representing a specific point in time is a surprisingly difficult problem to solve and there are a ridiculous number of ways you can screw that up. Thankfully representing the difference between two points in time is significantly easier and much harder to screw up.

    • @ahmidiyasser376
      @ahmidiyasser376 Před rokem +9

      @@renakunisaki to be really technical since this is the internet, the unit is actually seconds.

  • @TomStorey96
    @TomStorey96 Před rokem +110

    A SuperIO chip basically just integrates into a single physical chip a whole bunch of peripherals that would have traditionally been discrete. Things like serial ports, parallel port, keyboard and mouse controller etc, maybe even floppy controllers, real time clocks etc, or some combination of all that stuff.
    It all gets squeezed into one smaller form factor chip rather than being spread out as several.

    • @robloxian1585
      @robloxian1585 Před rokem +5

      Pretty much what I was going to post, u beat me to it, on a system that modern it would be effectively adding stuff that's not already built into the pch or extra of things already built into the pch (like usb)

    • @absalomdraconis
      @absalomdraconis Před 11 měsíci +1

      I've seen some of those chips with IBM joystick, fan controller, and power monitoring as well.

    • @robloxian1585
      @robloxian1585 Před 11 měsíci +1

      ​@absalomdraconis hmmm...yeah, I have/had a board (can't remember which one) and in the bios config it had a setting for joystick port, probably has a header somewhere for that...

    • @deadair32101
      @deadair32101 Před 10 měsíci +1

      @@robloxian1585 yeah, superIO is just where they stick literally anything and almost everything that they don't want to implement in discrete logic, so its a random crapshoot what can be in some of them lol

  • @avoidthevo1d
    @avoidthevo1d Před rokem +46

    I see you are a cultured individual as well. It was such a delight hearing Turnabout Sisters once again

  • @wearr_
    @wearr_ Před rokem +19

    wearr here! Glad I could help :) Didn't realize that you shouted us out at the end until someone in a completely different discord mentioned it lol. Thanks for all the videos you've made bringus!

  • @JosiahGould
    @JosiahGould Před rokem +23

    Little Sega easter egg I noticed on the case sticker. If you look at the ALLS logo upside down it bears a striking similarity to the STTV arcade board logo that Sega had in the 90s.

  • @pardok-qaza
    @pardok-qaza Před rokem +147

    It looks like it took around 1200 units. And my guess it's not an ms, but seconds. So around 20 minutes

    • @JordanWerthman
      @JordanWerthman Před rokem +8

      They are POSIX timestamps so the number of seconds since January 1, 1970 UTC

    • @superJK92
      @superJK92 Před 2 měsíci +1

      @@JordanWerthmanActually it is epoch time, more specifically Unix epoch time

  • @RedYoshiYT
    @RedYoshiYT Před rokem +52

    That's some amazing work, man! If I ever get my hands on a SEGA ALLS MX2, this will definitely come in handy! Thanks to you and everyone who contributed.
    (Update 6/30: I'm getting mine in a few weeks. So hooray!!!)

    • @BringusStudios
      @BringusStudios Před 11 měsíci +7

      Hey, did it work for you? Wanted to make sure the password works for all of the MX2's

    • @RedYoshiYT
      @RedYoshiYT Před 11 měsíci +8

      Yup, it worked for mine.

    • @flottenheimer
      @flottenheimer Před 10 měsíci +2

      @@RedYoshiYT Do you happen to know if it also works for other types of ALLS? Say, the ALLS UX?

    • @RedYoshiYT
      @RedYoshiYT Před 10 měsíci +1

      @@flottenheimer I don't own any other models than the MX2, so I'm not exactly sure.

    • @flottenheimer
      @flottenheimer Před 10 měsíci +1

      @@RedYoshiYT Mine is on its way. Don't know the model/version yet. Just trying to prepare ;D ...

  • @greenmoose_
    @greenmoose_ Před rokem +3

    I found your 2nd channel through CZcamss "new to you" thing. I am shocked it was actually useful! This was great, I had actually wondered how you were going to address the bios password issue! Very nice work!

  • @rustkitty
    @rustkitty Před rokem +98

    Bios for
    Amusement
    Linkage
    Live
    System
    h a c k e d

  • @Roobotics
    @Roobotics Před rokem +16

    Bus Pirates are also a good option for use with flashrom, less expensive than a pi and has buffers on the outputs and logic level options, but writing larger bios images can be a bit on the slow side.

    • @temp-anon_3690
      @temp-anon_3690 Před 26 dny

      @@superusermode can you detail a bit the explanations please ?

    • @superusermode
      @superusermode Před 22 dny

      @@temp-anon_3690 Sorry, I mis-spoke. VGA (plus HDMI and DVI) uses DDC (basically I2C), . You can find plenty of information on that.

  • @Sevenisko
    @Sevenisko Před rokem +25

    These are the UNIX timestamps, counting the seconds from the epoch (1/1/1970 - 00:00).
    And you can just simply remove the runtime_stop value from the runtime_start, which will give you 1354 seconds - so it's around 22 minutes and 30-40 seconds

  • @BrianMartin2007
    @BrianMartin2007 Před rokem +4

    I tried to help, Tecchie in your channel. I’m glad you got the password issue sorted !!

  • @MrMegaManFan
    @MrMegaManFan Před rokem +1

    Mad science being done here! I’m impressed you went to this much effort.

  • @StarSetByte
    @StarSetByte Před rokem +2

    i was not expecting this but hi bringus i'm glad i found your second channel

  • @DoloresCora
    @DoloresCora Před 2 měsíci

    your videos are a must-watch for anyone looking to learn and enjoy!

  • @solagraphy
    @solagraphy Před rokem +21

    Worth probably pointing out about motherboard based "RAID", it is not hardware raid on amd or intel motherboards. It is a feature you enable on your motherboard yes, but how they do it is in software. If you dont have an actual raid card or a sufficiently enterprise server with one integrated, it does not have hardware raid. Even if it did btfs and zfs are both a lot more performant. And unlike traditional raid they actually check file integrity actively rather than only whine when a disk fails.
    What I mean to say is 'real raid' hasn't been worth it for genuinely protecting your data in years, theres been a lot learned about doing it better at a filesystem level.

    • @einsteinx2
      @einsteinx2 Před rokem +6

      I came to the comments to see if anyone would say this. Hardware RAID is pointless in a home NAS in 2023 and honestly probably even in most enterprise use cases as well.

    • @JonBringus
      @JonBringus  Před rokem +10

      That's a very good point, I've still got the "mobo raid = hardware" misconception stuck in my head from somewhere

    • @LordOrwell
      @LordOrwell Před rokem +1

      it's also totally useless if your drives are mismatched. You need to use freenas or something similar what that is the case.

  • @valonquar1
    @valonquar1 Před 10 měsíci +9

    Late to the party, but the bios reset via the 2 leads you touch with a screwdriver thing, you literally have to be touching it when the machine is powered off, and continue holding it there while powering it on. I've had to do that on a few older laptops in the past. It's nuts but works.

    • @Bartymor
      @Bartymor Před 2 měsíci

      He tried it in full video, didnt work

  • @gamefixersvideos
    @gamefixersvideos Před rokem +1

    man I'm glad I stumbled across your channel! I'm going to see if I can get into that PC in our Mai Mai tomorrow. heheheheehehehe

  • @DonLuca27
    @DonLuca27 Před rokem +64

    This is seriously scary: a 4080 can crack an 8 characters password with lowercase, uppercase and numbers in 20 minutes.
    Time to step up our password game I guess...
    I wonder how much time would it take to crack a 12 character password with lowercase, uppercase, numbers and special characters.
    Probably knowing how long the password is beforehand helped out the process.

    • @CaptainSouthbird
      @CaptainSouthbird Před rokem +12

      Firstly, always a good idea to have unique passwords for every instance where one is required. I lax on things that are unimportant / don't access personal data, but otherwise I use an offline "password safe" and just generate a random password. So even if one is compromised, it doesn't open up anything else. But it's also worth noting that the password hash was backdoored here, and I mean, if an attacker has enough access to get into a database to steal password hashes, they've probably already compromised other data anyway.

    • @churipputori9087
      @churipputori9087 Před rokem +7

      On length alone, the time it takes to randomly bruteforce a password increases exponentially. Even with something as simple as a lowercase only password, increasing the length from 8 to 12 results in the total combinations possible going from 26^8 to 26^12. Even though the length is only +50% longer, the actual amount of combinations that have to be tried increases by the order of hundreds of thousands of times more. While it'd take only a few minutes to at worst an hour or so to crack the first password, the latter one would take upwards of 200 years to crack. Factor in the latter including uppercase letters, numbers, special characters, and so on, and the difference between the two goes from hundreds of thousands to hundreds of millions.

    • @FatheredPuma81
      @FatheredPuma81 Před rokem +6

      That 20 minutes means basically nothing btw. You can actually crack someone's password in less than a second if you get lucky enough and the length doesn't matter. A more accurate way of measuring it would have been to see how long it takes to generate every single password and then divide it in half.

    • @valshaped
      @valshaped Před rokem +1

      Yeah, it's time to upgrade to 30+ character passwords, whether xkcd-style or random. More length = better

    • @BlownMacTruck
      @BlownMacTruck Před rokem +1

      @@valshapedThat doesn’t really give you security. What gives you security is multi factor auth.

  • @Eliotime3000
    @Eliotime3000 Před 10 měsíci +4

    That motherboard has been manufactured by GigaIPC, which is the OEM division of Gigabyte for major companies. With that info, I must to say that this is a completely requested motherboard for SEGA.

  • @SDRIFTERAbdlmounaim
    @SDRIFTERAbdlmounaim Před rokem +11

    some bALLS you got there lol, seen the vid bout it yesterday and was hoping it would be cracked soon... not this soon tho 😂

  • @VisibleReality
    @VisibleReality Před rokem +9

    I'm pretty sure the super IO chip is just onboard Serial/Parallel ports

  • @givowo
    @givowo Před rokem +6

    on this channel you should "feature" your main channel so people can find it in the channels tab

  • @UmarBlox5124
    @UmarBlox5124 Před 2 měsíci

    Good video!

  • @FreyjaInternet
    @FreyjaInternet Před 10 měsíci +1

    Didn't see it anywhere in the other comments I scanned through, but having turbo mode on intel Core i-whatever processors is normal. It's a feature of the processor where it will temporarily boost the clock speed above the "base" clock speed for extra performance. Totally safe & normal, the processor will throttle back to base clock or below if it gets too warm. I think the idea is that with the standard coolers they come with the base clock is semi-guaranteed to be suitable all day long and the turbo speed is something it can use situationally. If you have a higher quality aftermarket cooler, especially with more midrange CPUs often you can put lots of load on it and it can run at its max turbo speed indefinitely.

  • @kjsweeney81
    @kjsweeney81 Před rokem +3

    You install WinXP onto a machine with only AHCI controller, but you will the AHCI driver either seeded onto the CD install or available by floppy (seeded option is easier). But XP will not boot on EFI, will require the legacy boot option.

  • @ZMacZ
    @ZMacZ Před 7 měsíci +1

    5:52 I think CSM is only available if you switch off UEFI, which in turn may enable other SATA modes, like IDE or Raid.
    Grab a cheap medium like a $20 sata ssd, copy the bios content onto it, so youc an always reset to original,
    but also copy the original drive into a file on that cheap medium, so you can restore that too.
    Make sure it reads ALL data, including hidden partitions and such. (sector copy to file, whole drive.)

  • @CobraTheSpacePirate
    @CobraTheSpacePirate Před rokem

    Excellent!

  • @yunodiewtf
    @yunodiewtf Před rokem +1

    Great. Now about IDA-diving into key protection

  • @renakunisaki
    @renakunisaki Před rokem +33

    I cringed a little when you cleared the password. I got locked out of a laptop once by doing that. Instead of clearing, it actually set a zero-character password... but the password entry wouldn't accept anything until you typed a character. 💀
    I wasn't about to pay $$$ to reset a "forgotten" password so I actually found the backdoor password generator online. Suck it, Gateway.

    • @CaptainSouthbird
      @CaptainSouthbird Před rokem +15

      That's a terrible design. But in any case, this BIOS actually prompted that it was going to clear it. Also from the previous video, apparently clearing CMOS kept the password, so I'm guessing even if something weird like that happened, clearing CMOS would've put the stock password back in.

    • @JonBringus
      @JonBringus  Před rokem +17

      That's spooky damn, luckily if I really need to I can resolder back onto the chip and restore my original dump

    • @amarokorama
      @amarokorama Před rokem +12

      @@CaptainSouthbird That clearly would not work. He could get the password hash by dumping the Flash (EEPROM) chip, so the password is stored in there. And at 1:49 you can see that it is in a region labelled "NVRAM" - non-volatile random access memory. That's how UEFI does it, there is no "CMOS" = battery-backed (S)RAM for storing non-volatile settings anymore like in the BIOSes of old, so you cannot reset it by taking out a battery or bridging a jumper. If you somehow managed to get the UEFI to reset the NVRAM, then it would most likely be wiped/cleared, meaning no password at all instead of a "stock password".

    • @NethercraftMC
      @NethercraftMC Před rokem +2

      what laptop was it?

    • @marsovac
      @marsovac Před 8 měsíci +1

      @@amarokorama wrong. Clearing the CMOS means clearing the user area. Which means the password does not go to empty, but rather it goes to the default rom password. Which for consumer motherboards is empty. But it is not the same thing, like in this board.

  • @ZMacZ
    @ZMacZ Před 7 měsíci +1

    4:35 You can erase the password by changing it into an empty string. That may reversely
    lead to changing this with any bios, by writing the same hash into the memory containing
    the hash, while keeping the rest exactly the same.

  • @m_5373
    @m_5373 Před rokem

    Awesome!

  • @galen__
    @galen__ Před rokem

    Awesome news 👍

  • @nipponG
    @nipponG Před 6 měsíci

    i watched both these vids & subbed to both these channels :) really cool!!!! HEY, i just noticed, LTT may have stolen your video idea??????? did you see that? It's in my recommended right now

    • @JonBringus
      @JonBringus  Před 6 měsíci

      We worked on our videos at the same time, I actually spoke to them about it at LTX, it's all good

  • @LelandHasGames
    @LelandHasGames Před rokem +2

    All this time I was thinking you were a goofy dumby. I stand corrected. You're a brilliant, goofy, dumby. Just like me. Good work, my dude.

    • @JonBringus
      @JonBringus  Před rokem +1

      I have my moments LOL. I'd love to get more technical with things but I'm worried it might shed off the less technical audience members. Luckily idgaf when it comes to this channel though

    • @LelandHasGames
      @LelandHasGames Před rokem +1

      @@JonBringus yeah. I definitely subbed to this one after discovering it and after watching this. I like the more technical stuff but yeah. I totally get it. There is an audience for the technical stuff. It's just not a very big audience.

  • @OGGIdris
    @OGGIdris Před 8 měsíci +2

    I noticed the password for the BIOS was referencing Initial D Arcade Stage 7, DAX being Double Aces Cross, or as commonly referred to as AAX.

  • @charginginprogresss
    @charginginprogresss Před rokem +4

    Lmao that BIOS screen is the same of my Asus laptop. It's a mixed legacy/non legacy BIOS with a legacy interface exactly like that "Aptio Setup Utility".
    Mine is version 316 (Copyright 2019) though.

  • @MxArgent
    @MxArgent Před rokem +2

    Bad idea I had: Grab a ALLS board and turn it into the Teradrive successor nobody wanted.

  • @janegoodall1837
    @janegoodall1837 Před 7 měsíci

    This is so cool.

  • @dosdoktor
    @dosdoktor Před 6 měsíci

    Clocking in at 16MB is huge. For a bios, it should have a heluvalotta features. You could fit 8 EFI compatible BIOSes on that. A normal BIOS containing a setup block and boot block + microcode could be as small as 128K and still boot a PC in legacy mode all day long. A boot block bios with microcode only could be as small as 64KB for most boards.

  • @stizandelasage
    @stizandelasage Před rokem +1

    I would just change bios and flash a new one now you're ahead of me

  • @thelitepredator
    @thelitepredator Před 8 měsíci

    Very nice im.impressed

  • @johnkristian
    @johnkristian Před rokem +6

    you can boot xp, just slipstream the intel ahci drivers onto the iso

  • @lireelf
    @lireelf Před rokem +3

    What's the point in cracking the password when you could just replace that hashed string with your hashed password when you know where's this string located anyway?

    • @JonBringus
      @JonBringus  Před rokem +5

      Actually yeah that would have been pretty smart & quick to do now that I think about it. That probably would have got me in no problem but I also really wanted to find the password because every single one of these Alls MX2 units shares a password. So now anybody that has one can use it.

  • @MotownBatman
    @MotownBatman Před rokem

    New Sub! Dryden, Mich.
    That was Awesome, hashcat, Check!

  • @PardusRain
    @PardusRain Před rokem +1

    Nice, for a 'B' type board it is not bad.

  • @-CLASSIFIED-
    @-CLASSIFIED- Před 6 měsíci +1

    Any update on what’s on the ssd that came with the saga alls ? I’m mega curious about that

  • @tinkol.5859
    @tinkol.5859 Před 10 měsíci +1

    I have tried on one ALLS from my friend several years ago, but did not got the BIOS password apparently. At that time, I found 2 rules of the boot order, one is it will boot to the last boot drive, and another one is it will fallover to the only bootable drive if the last boot drive doesn't exist, and these 2 rules exactly matches the settings in this video. And what I did is removed all the hard drive and leave a single USB drive on it, boot once, shutdown, then plug the hard drive back, and then will boot into the USB with hard drive attached.

  • @TatsuZZmage
    @TatsuZZmage Před rokem +2

    SuperIO, well if you break it out ya can connect a d-ISA-pointment to it.

  • @qwerty_9537
    @qwerty_9537 Před rokem

    ah rad!

  • @SelinSilverus
    @SelinSilverus Před rokem +2

    Can someone tell me what the background song was in the final part of the video? It sounds oddly nostalgic to me but I can't quite remember what it is.

    • @shelerr
      @shelerr Před rokem +1

      I'm pretty sure it's Fey's theme from Ace Attorney (turnabout sisters)

  • @oldchannel9911
    @oldchannel9911 Před rokem +9

    you should dump the software for the arcade game and send it over to the teknoparrot devs so they can add support in their emulator

  • @gamefixersvideos
    @gamefixersvideos Před rokem +3

    NICE!!! I've got an ALLS computer (I think thats what it is) in a Mai Mai that wont let me boot anything but its factory drive. I wonder if they used the same password on all of the computers???

    • @da1l616
      @da1l616 Před rokem +5

      Be careful, if you are using the original Sega software. Your system propably uses Bitlocker with the key stored in the TPM chip.
      Image the Disk and try booting that image in a different machine or VM. If windows requests a Bitlocker recovery, you are on thin ice.
      If you mess with the hardware or BIOS it could trigger the TPM to no longer provide the disk encryption key. Bricking the system.

    • @gamefixersvideos
      @gamefixersvideos Před rokem +1

      @@da1l616 I've already dupped the disk and it will boot on another platform but because specific I/O is missing it wont boot into the game.

    • @gamefixersvideos
      @gamefixersvideos Před rokem +1

      Welp... So much for that idea. I've got a RingEdge2 PC in my Mai Mai. :( Its got a custom Sega mobo with only micro USB on it too. Ugh. Stuck with an non english version of Mai Mai I guess.

  • @JessicaFEREM
    @JessicaFEREM Před rokem +4

    sega balls sega balls

  • @ichigo_nyanko
    @ichigo_nyanko Před 2 měsíci

    Would you bae able to change the password hash to a hash of a password you know and upload it back to the bios chip? And then when it compares the hash to the string you type in it would be comparing it to your hash not the default one

  • @yeet1248
    @yeet1248 Před 2 měsíci +1

    Yo Bro can we have LTT?
    Nah Dog we good LTT in the hood.
    LTT In the Hood

  • @user-ew5id4yz1j
    @user-ew5id4yz1j Před 2 měsíci

    I have to wonder if you bridged the clr CMOS before this rather complicated affair

  • @bloxxer02
    @bloxxer02 Před 9 měsíci

    Love the ace attorney music that shit slaps

  • @scj643
    @scj643 Před 10 měsíci

    Secure boot set to custom is interesting

  • @eusebiosksipolitos2524
    @eusebiosksipolitos2524 Před 9 měsíci

    What a adventure...Whooooooo....Thumb up......

  • @RHODEZ
    @RHODEZ Před 10 měsíci

    That area of the board that says CLR_CMOS, you can short those pins and reset the bios to default.... and clear any password...

  • @ozzelot3349
    @ozzelot3349 Před rokem +2

    "This is just a Pi 4"
    Meanwhile I'm still using my Pi 2 for flashrom

  • @GueroMane
    @GueroMane Před měsícem

    Hello sir so I been watching ur videos for a couple weeks now so I have a usb stick that was Linux and I put it in my windows pc didn’t know it would delete the contents on it so I was wondering since ur real good with computers if I was to send it to u if u could find a way to get the stuff back on there I have went trough a few partition wizard the content is still there but unfortunately I ain’t trying to pay like 99 bucks to recover one usb is there a way u could help

  • @marcodelao9148
    @marcodelao9148 Před 10 měsíci +1

    why couldn't you use rainbow tables with that hash you were able to recover?

  • @venichen1
    @venichen1 Před 13 dny

    I'm curious if it's possible to flash the standard Gigabyte BIOS onto the motherboard?

  • @ZeroWalker26
    @ZeroWalker26 Před rokem +1

    Glad you solved that I hope you can some how bypass that was it Key pass thing to acess the game on the SSD and maybe Archive it. Sure horse betting game in JP is maybe not something people are dying to play but archiving it still a good idea seeing as it´s still part of gaming history.

  • @sarowie
    @sarowie Před rokem +3

    question: I know that the password is more valuable then just access, but assuming all I wanted was access: Could I not simply pick any password and overwrite the flash section containing the password? OK, I would risk there being a checksum and again: the password is more valuable as it works on all machines.

    • @JonBringus
      @JonBringus  Před rokem +6

      I THINK that you could replace the default hash with your own hash that you know the password for, but like you said it's better to know the password so that everyone with an Alls MX2 has a password they can use too now

  • @Lethaltail
    @Lethaltail Před 11 měsíci

    ofc goilup had a hand in this lol, nice

  • @Wormetti
    @Wormetti Před rokem +2

    I wonder if there are more passwords that match that hash edit: didn’t realise it was SHA256, there will be no other passwords for this hash

  • @chswin
    @chswin Před rokem +2

    The units look like Unix epoch

  • @israelurbano2515
    @israelurbano2515 Před 4 měsíci

    you are a nice guy

  • @bush2137
    @bush2137 Před rokem +2

    So, if you have connected the bios chip to thy pi, why couldn't you have flashed clean bios from the public revision of that board, since you know exactly what it is?

    • @gqinc1202
      @gqinc1202 Před rokem +9

      In case the bios has sega specific settings, and not wanting to risk corrupting anything if the bios flash failed

    • @JonBringus
      @JonBringus  Před rokem +7

      I did try that actually. I tried the F6 version BIOS for this identical board but it wouldn't boot up afterwards. Not sure why. I tried some consumer H310 boards as well but none of those BIOS's would let this thing boot up

    • @sarowie
      @sarowie Před rokem +1

      you can use the password on any machine/board you find the wild, without having to solder to it.

    • @bush2137
      @bush2137 Před 11 měsíci

      @@JonBringus guess that's something we'll never know the answer too

  • @D-Mny
    @D-Mny Před rokem

    Pretty simple fix get the bios for the consumer version. And flash it to this board

  • @LordOrwell
    @LordOrwell Před rokem +1

    I'm really surprise. Almost always, a desktop-style PC has a jumper on the board that bypasses the bios password. On this device, assuming yours has the MDH11BM motherboard, resetting the bios with the jumper clears the password.

    • @absalomdraconis
      @absalomdraconis Před 11 měsíci

      He tried that already. Either Sega had them disable that on this board, or the process is more complicated (such as it enabling a "OEM password" instead of clearing the user's password).

  • @marsovac
    @marsovac Před 3 měsíci

    Secure boot protects the PC from viruses or malware that would attack the BIOS or drivers and would therefore be hard or impossible to detect by an antivirus since it would have Ring0 privileges from the get go before the OS is even booted.

  • @namanienie123
    @namanienie123 Před 12 dny

    Sega BALLS

  • @bigtitmaster
    @bigtitmaster Před rokem

    Just watched the first one. I’m lucky

  • @Wowcan69
    @Wowcan69 Před rokem +1

    Turn it into a steam cache server please

  • @IND4GR0V3
    @IND4GR0V3 Před rokem +1

    should validate that card with gpuz

  • @GbmbRnmf
    @GbmbRnmf Před 2 měsíci

    Finally I can fully use my bALLS

  • @Aeduo
    @Aeduo Před rokem +4

    You think it'll be the same password for every unit? Or will they have been each programmed individually from the factory?

    • @JonBringus
      @JonBringus  Před rokem +7

      Historically Sega has used the same bios password for all of their PC-based units, so every Alls MX2 SHOULD be using this password

    • @Aeduo
      @Aeduo Před rokem +2

      @@JonBringus ah, interesting. I guess the bios password isn't that huge of a security thing. Probably just to prevent theft.

    • @absalomdraconis
      @absalomdraconis Před 11 měsíci +1

      ​@@Aeduo: More to prevent arcade owners from doing unscrupulous things, I think.

  • @knoopx
    @knoopx Před 8 měsíci

    what are those clippy thingies actually named? xD

  • @BobDoodlesmoth
    @BobDoodlesmoth Před rokem +2

    😲

  • @TheJimmyCartel
    @TheJimmyCartel Před rokem +1

    NO WAY!!!

  • @andrewdunbar828
    @andrewdunbar828 Před 2 měsíci +1

    It's a hash, you can't do anything with it. Also there's a thing you can do with it.

  • @elwinroyale
    @elwinroyale Před 11 měsíci

    Secure boot is what it says it is
    Stops malicious boots

  • @HoZKiNZ
    @HoZKiNZ Před rokem +2

    Ok, But whats on the ssd?

    • @JonBringus
      @JonBringus  Před rokem +3

      A lot of bitlocker'd partitions that I don't have the keys to

    • @HoZKiNZ
      @HoZKiNZ Před rokem +3

      @@JonBringus :(

  • @tqrules01
    @tqrules01 Před 5 měsíci

    16mb. Bloody Hell I remember them being 3 mb 😂 God I'm old

  • @Yuriel1981
    @Yuriel1981 Před rokem +3

    Nice hacking, I saw a vid where someone hacked a Lenovo bios by shorting 2 of the pins for BIOS communication after boot initiated and before the Bios flash screen. I wonder if that would work also. The bios chips aren't the same. But they both had the 8 solder pin config, so identifying those pins for the chip would be required. But I'd love to see if different chips would have the same effect.

    • @yungvarg2301
      @yungvarg2301 Před rokem +2

      Iirc he tried that in the main channel video on this unit but I'm not entirely sure

    • @15fakeaccount
      @15fakeaccount Před rokem +2

      That only works with older Lenovo laptops, because these store password in separate security chip from BIOS.

  • @lou2be247
    @lou2be247 Před rokem +2

    Ok

  • @snowyquy2766
    @snowyquy2766 Před měsícem

    He said CP Iboss .

  • @ethanchow9170
    @ethanchow9170 Před rokem +5

    Couldn’t you just delete the password instead of cracking it if your goal is just to get into setup? Zero out the password flash dump back onto the rom and it’ll boot back up.

    • @sarowie
      @sarowie Před rokem +6

      Having the password could work an all machines without soldering to the board.
      Deleting the password only works on one machine.
      There also could be a checksum somewhere. Or the BIOS developer could have gone full nuts and make multilevel checksums. That would not be "secure", but surely annoying.

  • @jace_1989
    @jace_1989 Před 17 dny +1

    Bro if someone found your house and broke in all they would have to do to get past any and all security is say gaming

  • @Hellscaped
    @Hellscaped Před 2 měsíci

    Couldn't you just hash an arbitrary password and replace it in the bios rom and reflash it

  • @busterscrugs
    @busterscrugs Před rokem +1

    bro, a cheap ch134a would've been way easier lol. but as a fellow cheapskate/use-what-you-have-on-hander, I understand.

  • @examrot8060
    @examrot8060 Před 10 měsíci

    hello jon bringus or anyone here can tell how can i get the usb keyboard model number i kinda like it thanks ?!

    • @JonBringus
      @JonBringus  Před 10 měsíci

      If you mean the Cherry keyboard it's a MX 11900

  • @djksfhakhaks
    @djksfhakhaks Před rokem +2

    People still use hardware raid?

    • @Weneedaplague
      @Weneedaplague Před rokem

      Virgin software raid user

    • @Aeduo
      @Aeduo Před rokem +2

      Windows users do, because there isn't any great built in software RAID functionality, where linux has like 10 ways to have RAID. :p Macs have it built in too.

    • @glenndoiron9317
      @glenndoiron9317 Před rokem

      @@Aeduo Windows XP called, they want their software raid back.

  • @haxalicious
    @haxalicious Před 6 měsíci

    Using that as a NAS, hardware RAID sucks anyways. Just use the CPU for ZFS, which puts hardware RAID to shame with the amount of features.

  • @cargamesgaming3445
    @cargamesgaming3445 Před 2 měsíci

    milliseconds

  • @dustojnikhummer
    @dustojnikhummer Před rokem +6

    These days hardware RAID isn't the best idea. ZFS is great!