How To Remove, Clear, Reveal, Unlock or Reset BIOS Security Password

If you can boot from CD/USB

When Windows doesn’t boot properly and you cannot get into the BIOS to change the boot order, you could be lucky enough that booting to CD or USB might already be set at a higher priority than booting to Windows and simply inserting a CD or flash drive will boot to it automatically. It’s also possible that CD or USB booting could be just below hard drives in the order, in which case you would need to temporarily disconnect the hard drive(s).

If you can still access Windows, another solution to enable CD/USB booting is using a great tool called Plop Boot Manager. What it does is allow booting from these devices even if the system BIOS doesn’t support the function or the boot order is not accessible. Even if you don’t want it for this purpose, Plop is a great tool to know about for using on older computers.

Here are some tools which can be used by booting from the relevant CD or USB flash drive. Simply burn the downloaded ISO file to a disc or use one of these ISO to USB tools.

PC CMOS Cleaner

PC Cmos Cleaner

PC CMOS Cleaner is able to recover, remove, decode and display the user or supervisor password stored in the BIOS irrespective of the machine brand. Award, American Megatrends (AMI), Compaq, Phoenix, Samsung, IBM, Compaq, DTK, Thinkpad, Sony, Toshiba are all in the list of supported BIOSes so there’s a good chance your BIOS is included. PC CMOS Cleaner is a bootable Linux CD so you don’t have to worry about operating system compatibility. On launch the program will first try to decrypt and display a list of possible passwords. Failing that, you can choose to remove the password using two options, the second of which will completely reset the BIOS to defaults so you’ll have to go and reconfigure it afterwards.

Download PC CMOS Cleaner

CmosPwd by CGSecurity

CMOSPWD

This is one of the more up to date and popular CMOS decryption tools although it’s still quite old dating back to 2007. CmosPwd decrypts the password stored in the CMOS and displays it. The following BIOSes are supported:

  • ACER/IBM BIOS
  • AMI BIOS
  • AMI WinBIOS 2.5
  • Award 4.5x/4.6x/6.0
  • Compaq (1992)
  • Compaq (New version)
  • IBM (PS/2, Activa, Thinkpad)
  • Packard Bell
  • Phoenix 1.00.09.AC0 (1994), a486 1.03, 1.04, 1.10 A03, 4.05 rev 1.02.943, 4.06 rev 1.13.1107
  • Phoenix 4 release 6 (User)
  • Gateway Solo – Phoenix 4.0 release 6
  • Toshiba
  • Zenith AMI

With CmosPwd, you can also backup, restore, erase or even kill the CMOS. CmosPwd is included in the Hirens Boot CD DOS programs menu. Select “9. Next” -> “2. BIOS/CMOS Tools” -> “2. BIOS Cracker 5.0 (cmospwd)”. There’s also a version you can run from within Windows which is available on the CGSecurity website along with some useful information.

!Bios by eleventh alliance

!Bios

!Bios is a tool that was developed for a brute force attack on BIOS passwords. You can also backup and restore the BIOS and there’s even a Blaster option where can blank certain parts of the BIOS in the hope of removing the password, a powerful and potentially dangerous option because it could completely corrupt the BIOS. !Bios can try and crack the passwords used in some common BIOSes including various versions by IBM, American Megatrends (AMI), Award and also Phoenix. It’s a very old tool dating back to the late 90’s so is unlikely to work effectively on more recent computers.

Like CmosPwd, !Bios is also included in the Dos Programs menu of Hirens Boot CD. Select “9. Next” -> “2. BIOS/CMOS Tools” -> “4. !BIOS 3.20 (ibios)”. You can also download a separate !Bios Windows tool.

Invalidating the CMOS Checksum Manually

If you prefer to do it manually rather than relying on automated programs or the other tools like CMOS De-Animator aren’t working, it is possible to reset the BIOS password by using the debug.exe tool which will invalidate the CMOS checksum in a similar way to CMOS De-Animator. This can be achieved by typing two commands into the debug tool if you first boot up the computer in FreeDOS. Here are the instructions.

1. Install FreeDOS on a USB flash drive using Rufus or UNetbootin.

2. Download the debug.exe tool and save it to the root of your USB flash drive.

3. Boot up the computer with your USB flash drive and type the following commands: (take note that the second and third commands start with the letter O and not the number zero.)

debug
o 70 2E
o 71 FF
quit

reset bios password with debug

4. Restart your computer with Ctrl + Alt + Del and you should encounter an error message like “CMOS checksum error” which is normal. You can now access the CMOS setup without entering a password.

80 Comments - Write a Comment

  1. Al 2 weeks ago
    • HAL9000 2 weeks ago
  2. loco bennelii 4 weeks ago
  3. Adil Radoncic 1 month ago
  4. Julie Bernard 2 months ago
  5. jaxonpalmer 2 months ago
  6. demethriuz galang 2 months ago
  7. Yvonne 2 months ago
  8. Ehtesham 2 months ago
  9. Mohamed 2 months ago
  10. Rene 5 months ago
  11. Ulises Gutierrez 7 months ago
  12. Collin 10 months ago
    • Collin 10 months ago
  13. cl dickinson 10 months ago
    • Rob 7 months ago
  14. IABROS 12 months ago
  15. zubair Mundasseri 12 months ago
  16. dan 1 year ago
  17. Peter 1 year ago
  18. Peter 1 year ago
  19. All Wilson 1 year ago
  20. Cliff Cook 1 year ago
  21. John 1 year ago
    • HAL9000 1 year ago
  22. ikhsanul 2 years ago
    • HAL9000 2 years ago
  23. Taikhoan 2 years ago
  24. bubble 2 years ago
  25. Jay 2 years ago
  26. Leza 2 years ago
  27. Akahee Nathaniel 2 years ago
    • Teews 2 years ago
  28. ayanda 3 years ago
  29. Lisa 3 years ago
    • Hans 3 years ago
  30. xaris 3 years ago
  31. Usmik Saha 3 years ago
  32. Notpil 3 years ago
    • DrJasonThomas 3 years ago
    • russ 3 years ago
    • Fachri 3 years ago
  33. Bright 4 years ago
  34. 4bigana 5 years ago
    • malc 5 years ago
  35. Pablo 5 years ago
    • kaki 4 years ago
  36. WNantes 5 years ago
  37. Benjamin E. Nichols 6 years ago
  38. BGM 6 years ago
  39. Tony Joseph 6 years ago
  40. Ikem 6 years ago
  41. erwin 6 years ago
    • HAL9000 6 years ago
  42. Zaven 6 years ago
  43. Geeboy 6 years ago
    • HAL9000 6 years ago
  44. jahangir chauhan 6 years ago
  45. raymond 6 years ago
  46. Prince Dalieh 7 years ago
  47. nathan 7 years ago
  48. Jozef 7 years ago
  49. Stephen Highzeek 7 years ago
  50. sameer misger 8 years ago
  51. shraddha 8 years ago
  52. Josh 8 years ago
  53. Persia 8 years ago
  54. Dragos 9 years ago
  55. mino 9 years ago
  56. deza 9 years ago
  57. arjun 9 years ago
  58. Amirz 10 years ago
  59. Gaara 10 years ago
  60. jaymanjula 11 years ago
  61. digArt 11 years ago
  62. Roy Raay 12 years ago
  63. bhasidh 12 years ago
  64. chunky 13 years ago
  65. Ammar 13 years ago
  66. MR7 13 years ago

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Your comment is subject to approval. Read our Terms of Use. If you are seeking additional information on this article, please contact us directly.