The Backstory
I've been given a used server from work. This is fine, I've 'disposed' of servers, via the proper process, in this manner many times for my home lab. This one looked nice on paper. Dual Opteron 6380 16 core with 128Gb memory. Nice!
The problem arose when I went to boot my USB key to zero out the drives... I couldn't boot from USB as the BIOS had it disabled. Boo. Entering the BIOS asks for a password! Naturally. This was a 'FireEYE' management server, and thus far no one at the company has responded to inquiries.
This board appears to have an eeprom with AMI BIOS on it...
What I've Tried
I've gone through the manual for the motherboard and it states that all I need to do is turn the server off and short the pads JBT1 and all will be well. No dice. Next, I removed the CMOS battery for a solid 7 hours and shorted the pads a few times. I even removed the power supplies during this time. Nada.
I even tried the AMI 'backdoor' passwords that I've Googled. They do nothing.
I don't get an hex code when it fails, it just says 'Too many tries' and continues the boot procedure.
The Question
I can PXE boot, so I can get into a Linux OS (Ubuntu) Is there some kind of a CMOS password cracking utility that would work? Even a brute force attack... I can happily let this server run on a desk at work while it whittles away at the password...
Motherboard / BIOS Information
Supermicro H8DGU-F-FIO10 BIOS Date: 12/31/2013 Rev: FI3.0c
AMIBIOS(C)2010 American Megatrends, Inc
Website:
Super Micro Computer, Inc. - Aplus Products | Motherboards | H8DGU-F
Any help would be appreciated.
Thanks!
I've been given a used server from work. This is fine, I've 'disposed' of servers, via the proper process, in this manner many times for my home lab. This one looked nice on paper. Dual Opteron 6380 16 core with 128Gb memory. Nice!
The problem arose when I went to boot my USB key to zero out the drives... I couldn't boot from USB as the BIOS had it disabled. Boo. Entering the BIOS asks for a password! Naturally. This was a 'FireEYE' management server, and thus far no one at the company has responded to inquiries.
This board appears to have an eeprom with AMI BIOS on it...
What I've Tried
I've gone through the manual for the motherboard and it states that all I need to do is turn the server off and short the pads JBT1 and all will be well. No dice. Next, I removed the CMOS battery for a solid 7 hours and shorted the pads a few times. I even removed the power supplies during this time. Nada.
I even tried the AMI 'backdoor' passwords that I've Googled. They do nothing.
I don't get an hex code when it fails, it just says 'Too many tries' and continues the boot procedure.
The Question
I can PXE boot, so I can get into a Linux OS (Ubuntu) Is there some kind of a CMOS password cracking utility that would work? Even a brute force attack... I can happily let this server run on a desk at work while it whittles away at the password...
Motherboard / BIOS Information
Supermicro H8DGU-F-FIO10 BIOS Date: 12/31/2013 Rev: FI3.0c
AMIBIOS(C)2010 American Megatrends, Inc
Website:
Super Micro Computer, Inc. - Aplus Products | Motherboards | H8DGU-F
Any help would be appreciated.
Thanks!
Last edited: