why [Hale] result Cracking the BIOS of a 10-year-old laptop left over from the Australian education program• When your BIOS starts to tell you that certain types of hardware are not allowed, you don’t have much choice.
at first [Hale] He planned to buy a second-hand Lenovo X260 to replace his dying laptop, but his plan was ruined. The surge in demand caused by the pandemic has led to price inflation even in the second-hand laptop market. Due to the need for a small and reasonably priced laptop with a built-in Ethernet port, the Lenovo Thinkpad x131e was purchased. Although the laptop is older than what he likes, [Hale] Determined to make it work. He hardly knew that he was about to begin the journey of maintenance rights.
The problem first appeared when the Broadcom WiFi adapter stopped working reliably. He replaced it, but found that the coaxial antenna cable was damaged. Even after replacing the damaged cable, the WiFi adapter still does not work well. Looking back at the past erratic Broadcom WiFi adapter problems, I decided to replace it with an Intel mPCIe WiFi adapter. After re-energizing, [Hale] I was shocked to find the following news:
Unauthorized network card inserted-turn off the power and remove the miniPCI network card
This is where things get interesting. Use the ready-made SOIC8 clip and CH340 programmer, [Hale] Dump the BIOS in the flash memory chip of the laptop to another computer and start a hacker attack. After countless hours of research, stimulation, hacking and reverse engineering, the laptop again uses the new Intel WiFi adapter. His website details how he reverse-engineered the BIOS within a few days.
But this is not all! [Hale] It can also modify the hardware so that his slightly more modern mPCIe Wi-Fi adapter can restart after the computer enters the sleep state.This is an elegant hack, it must be Check [Hale]s website is complete detail.Finally, this is a nice Easter egg for anyone who wants to start their laptop my own Logo.
We applaud [Hale] For his outstanding efforts to keep working equipment away from the landfill. We have introduced many hacking attacks that have similar goals in the past. Do you have any hackers you want to share? Submit via the prompt line.