Home » Questions » Computers [ Ask a new question ]

BIOS Hard Drive Password Security?

BIOS Hard Drive Password Security?

I have a Dell Latitude E6400 and I would like to know how secure setting a BIOS HDD Password is? Does this apply some form of encryption to the contents of the drive or is it just some simple lock on accessing the drive? I.e. if the notebook was lost or stolen could the data on it be accessed by someone with a bit of know how?

Asked by: Guest | Views: 240
Total answers/comments: 2
Guest [Entry]

"BIOS passwords are simple locks. If you don't provide the password, the BIOS simply stops and doesn't continue the boot process.

There are two ways to get around this simple lock:

Clear the BIOS/CMOS memory (usually requires direct motherboard access).
Remove the drive and connect it to another computer (easier).

Update: As Blackbeagle's answer mentions, there is a HDD password defined as part of the ATA specifications. This is also a simple lock, but it's implemented in the drive, so neither of the above steps will bypass it. Some technical knowledge (and possibly some additional hardware) is required. You might be interested in this primer article on HDD passwords.

The BIOS lock is a decent deterrant in any number of movie-plot scenarios: someone with limited technical knowledge, or situations where the attacker can access the computer but doesn't have time or freedom enough to take it apart. If you're just trying to prevent your co-worker or family member from access, this works. However, this is not a significant deterrant for a determined attacker or someone who has unlimited physical access.

The ATA-level lock is a better deterrent, but it isn't perfect. Again, a determined attacker, given enough time, will get your data.

Full-disk encryption is available, and provides better protection. Self-encrypting drives that do this in hardware exist, and there are plenty of software options. Data encryption makes it much more difficult for an attacker to get your data, but there are always ways to get around encryption. (In particular, beware of Lead-Pipe Cryptanalysis.)"
Guest [Entry]

"For BIOS boot password, the answer is correct- relatively easy to bypass. Normally short the CMOS down.

For hard drive password locks - I believe that that they normally have a small crypto chip on the circuit board. When you enable them, the ATA spec then sends a signal back to the BIOS that results in control passing to the chip. It then asks for the password. Initially when you set it, it takes the password, encrypts it, and stores it on the drive platters. Subsequently when the drive is booted, the crypto chip assumes control, queries for the password and checks it against the stored copy. If they match, the crypto chip allows further boot.

THERE ARE DRIVE DECRYPTERS. I don't know the pricing, but I've seen them. They plug directly into the drive and can decrypt this sort of protection. It might be possible to swap circuit boards, but that wouldn't work if the drive manufacturer was smart enough to move the crypto chip inside the casing alongside the platters."