Hard Drive Not Recognized,BIOS Supervisor Password

08
2014-07
  • user2816759

    I have a Toshiba P855-S5200 laptop that I bought from Ebay around a year ago. It was running fine and smooth until I wanted to upgrade the existing hard drive to SSD. I exchanged my SSD (that was already running in my desktop) with the laptop hard drive. My laptop was running fine but my desktop was having problems with the laptop hard disk. Then I decided to exchange them again to bring them into the original situation and now my laptop doesn't recognize it's hard drive nor the SSD. After some trials of trying to make it work, I found out that the laptop had a BIOS Supervisor password (not the BIOS password, but Supervisor password ) set. I am thinking that might be what is causing the problems. I tried many ways (hiren's boot cd, jumping the EEPROM chip) to get that password removed, but no luck. I am sending laptop to Toshiba to get the password removed but they said that the hard drive will not be covered by warranty or something like that. So, Here I am. All I want is that Hard drive to be formatted and to be used in another computer. I bought a SATA-to-USB connection to test the drive in different desktops (my work desktop and friend's desktop), but none of them recognize it. Help Me out please?

  • Answers
    Know someone who can answer? Share a link to this question via email, Google+, Twitter, or Facebook.

    Related Question

    BIOS Hard Drive Password Security?
  • user10762

    I have a Dell Latitude E6400 and I would like to know how secure setting a BIOS HDD Password is? Does this apply some form of encryption to the contents of the drive or is it just some simple lock on accessing the drive? I.e. if the notebook was lost or stolen could the data on it be accessed by someone with a bit of know how?


  • Related Answers
  • quack quixote

    BIOS passwords are simple locks. If you don't provide the password, the BIOS simply stops and doesn't continue the boot process.

    There are two ways to get around this simple lock:

    1. Clear the BIOS/CMOS memory (usually requires direct motherboard access).

    2. Remove the drive and connect it to another computer (easier).


    Update: As Blackbeagle's answer mentions, there is a HDD password defined as part of the ATA specifications. This is also a simple lock, but it's implemented in the drive, so neither of the above steps will bypass it. Some technical knowledge (and possibly some additional hardware) is required. You might be interested in this primer article on HDD passwords.


    The BIOS lock is a decent deterrant in any number of movie-plot scenarios: someone with limited technical knowledge, or situations where the attacker can access the computer but doesn't have time or freedom enough to take it apart. If you're just trying to prevent your co-worker or family member from access, this works. However, this is not a significant deterrant for a determined attacker or someone who has unlimited physical access.

    The ATA-level lock is a better deterrent, but it isn't perfect. Again, a determined attacker, given enough time, will get your data.

    Full-disk encryption is available, and provides better protection. Self-encrypting drives that do this in hardware exist, and there are plenty of software options. Data encryption makes it much more difficult for an attacker to get your data, but there are always ways to get around encryption. (In particular, beware of Lead-Pipe Cryptanalysis.)

  • bitlocked

    With due respect, there is a misunderstanding between BIOS passwords and HDD passwords. Another between password and encryption. Another between HDD security and Security chip on the mobo.

    1. BIOS pwds protect the boot process only: if the password is not provided to BIOS during power on sequence, then the power on sequence is stopped. BIOS pwd are stored on the mobo. At this stage, the disk has not been even accessed. HDD password (actual name is ATA Security) is provided by the drive only, and not by the BIOS. HDD pwds are stored on the drive only. However the BIOS needs to ask the pwd to the user and pass it to the drive (it is not checked either by BIOS). The HDD will then decide if it will unlock the drive. If not no data can be read or write.

    2. HDD passwords don't relate to disk encryption. The ATA Security feature is just a lock/unlock mechanism. Data may be encrypted or not by the system, this is transparent to the HDD controller onboard the HDD. Note that some Hitachi Travelstar disks are always encrypted, but are not protected (the encryption key is not released outside the drive, only the drive knows it). The goal is to scramble the data, and force them to be read by the HDD chip only, but there are provided to everyone. Protection will be available only by mean of ATA Security.

    3. Passwords and credential in general may be stored in simple storage (bare EEPROM) or in smart storage. Bare EEPROM can be read and written. Smart storage is offered by micro controller chips (similar to MMC cards) like the famous "TPM" (on of the Trusted Computing Group standard). TPM may store passwords, or crypto keys safely. They are associated with the computer mobo before being used, so swapping TPM between computer doesn't work. It is not possible to read them. They can be cleared only. Simply said you provide the pwd you want to confirm, the chip says Yes or No but you cannot guess which pwd would leads to Yes. TPM are used by new EFI BIOS to ensure the boot process is safe, signature of the boot software and hardware are stored in the TPM. Should they differ at boot time, the user will be informed and will need to confirm that he/she wants to continue unsafe.

  • Crash893

    I believe you are wrong on item number 2

    If the op is referring to a password on the hdd bios itself then removing and placing it in another drive will not remove the password

    however removing the hdd circit board and replacing with the exact same model board will.

  • Blackbeagle

    For BIOS boot password, the answer is correct- relatively easy to bypass. Normally short the CMOS down.

    For hard drive password locks - I believe that that they normally have a small crypto chip on the circuit board. When you enable them, the ATA spec then sends a signal back to the BIOS that results in control passing to the chip. It then asks for the password. Initially when you set it, it takes the password, encrypts it, and stores it on the drive platters. Subsequently when the drive is booted, the crypto chip assumes control, queries for the password and checks it against the stored copy. If they match, the crypto chip allows further boot.

    THERE ARE DRIVE DECRYPTERS. I don't know the pricing, but I've seen them. They plug directly into the drive and can decrypt this sort of protection. It might be possible to swap circuit boards, but that wouldn't work if the drive manufacturer was smart enough to move the crypto chip inside the casing alongside the platters.