HP Compaq CQ62 bios is crypted! (Blowfish, Hawal, RSA) HOW TO DECRYPT IT? (Easy trick!) 1. Just flash new bios in notebook. 2. Unpack EXE file with winrar. 3. Edit platform.ini - this section: ---------- Original State ------------- [BackupROM] Flag=0 FilePath=c: FileName= ;Flag default : 0. ; 0 : No backup BIOS. ; 1 : Backup current BIOS and new BIOS binary. ;FilePath default : empty. ; empty : Use current directory. ; String : Directory for backup BIOS. ;FileName default : empty. ; empty : Use platform ID as file name. ; String : File name for backup BIOS. ;yyy.yyy = Current BIOS image ;yyy_01.yyy = Previous BIOS image ;yyy_new.yyy = New BIOS image --------------- Edited state --------------- [BackupROM] Flag=1 FilePath= FileName= -------------------------------------------- 4. Start Insydeflash.exe and reflash again. (But now flasher read original bios.) 5. Produced image <Board ID>.BIN is good flasheable *.FD file and easy can be edited with BIOS tools. 6. Use oldest Insydeflash.exe to flash into notebook. 6.1 Most clear is to use as recovery image and flash via usb stick.
Neat trick to flash it to notebook. But I fear the future will only bring us more and more of this type of stuff. In the future we may all be forced to flash our bios with a modded one just to get a bootleg OS to load. I have a HP notebook that had a bios that would only allow Windows Vista to be installed until Win 7 came out and then HP put out a new bios so users could change to Win 7.
You mean a much older version of the Insydeflash.exe? Can you share the one that you used, please? Thanks!
I've used a simple backup made by a uiversal backuptool therefore. Anyway it would be better to capture the decypted data before they are flashed onto the EEPROM or even to get an output before. Is there a way to access the memory (data)?