Two hours and two Python scripts later, was able to dump the contents of his drive. By accessing the hard drive controller’s serial port, was able to see the first few lines of the memory and the buffer. Another Hackaday post proved to be more promising. After downloading the required tool, he found it only worked on WD hard drives, and not the Seagate sitting lifeless on his desk. originally found one of our posts regarding the ATA password lock on a hard drive. What followed is a walk down Hackaday posts from years ago. Hard drive gets shuffled around between a few ‘computer experts’ in an attempt to solve the problem, and eventually winds up on ’s workbench. ![]() Fast forward a few months, and the password is, of course, forgotten. Here’s a common story when it comes to password retrieval: guy sets up a PC, and being very security-conscious, puts a password on his Seagate hard drive.
0 Comments
Leave a Reply. |