Yep it started to seed then, yesterday was still dead, good, found something to do to maintain the mood once the symposium is over lol, plus it's a while i don't boot up the evil stack, could be funny
both images so we can even make a full comparison of the disks structure, yesterday they spoke about the password being missing, if it's windows 7 or boots up via bios should be quickly bypassable with no need to crack them
Oh alright got it, thought you booted it up as a live system, was asking cause i had an old utility to 'bypass' entirely the password protection at boot, never needed more than 2 attempts (no crack or anything, it's another type of exploit that patches the security sector of the chipset/subsystem pre-boot), and thought was time to search for the usb key in which it was!
Yep it started to seed then, yesterday was still dead, good, found something to do to maintain the mood once the symposium is over lol, plus it's a while i don't boot up the evil stack, could be funny
both images so we can even make a full comparison of the disks structure, yesterday they spoke about the password being missing, if it's windows 7 or boots up via bios should be quickly bypassable with no need to crack them
How's booting up? old Bios or U/EFI?
Oh alright got it, thought you booted it up as a live system, was asking cause i had an old utility to 'bypass' entirely the password protection at boot, never needed more than 2 attempts (no crack or anything, it's another type of exploit that patches the security sector of the chipset/subsystem pre-boot), and thought was time to search for the usb key in which it was!
Didn’t the bios password get leaked?
You can reset the root password with linux. chntpw is the command.
If you need I can use passware to crack it