From 7104bb139002e1d171bf9bfad56a3223ce9cad94 Mon Sep 17 00:00:00 2001 From: Bottersnike Date: Fri, 26 May 2023 07:57:27 +0100 Subject: [PATCH] JS-based generator --- .../pages/sega/software/security/index.html | 41 ++++++++++++++++++- 1 file changed, 39 insertions(+), 2 deletions(-) diff --git a/templates/pages/sega/software/security/index.html b/templates/pages/sega/software/security/index.html index fef591a..393492f 100644 --- a/templates/pages/sega/software/security/index.html +++ b/templates/pages/sega/software/security/index.html @@ -32,8 +32,6 @@

This can be bypassed either by extracting the password used, or by first powering on the Ring* system with the drive connected, then hotplugging the SATA data cable on the drive while keeping the drive powered.

-{% markdown %}{% include relative("~ata.md") %}{% endmarkdown %} -
Why does this work?

The following is the sequence of possible security modes for an ATA drive:

@@ -254,6 +252,45 @@

This allows us full read-write access to the drive without ever knowing the password!

+{% markdown %}{% include relative("~ata.md") %}{% endmarkdown %} + +

Generate drive passsword:

+ + + + + + + + + +
Model number:
ATA password:
+ + +

Windows Password

It seems silly to mention, but it's worth noting. AppUser will automatically log in, but if you need to log back in, or wish to login as SystemUser, you'll need the passwords.