Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I have approx. 30x Western Digital SATA 2.5" hard drives ranging from 80GB to 500GB. These are ex-Tandberg RDX QuikStor backup drives that I no longer use and would like to use them as spare laptop hard drives.
The only problem is upon installing the drive in a laptop it prompts for a hard drive user password.
Are there any open source methods to wipe the password (and data; I don't care about that)? I've tried using various wiping methods (dd, dban etc.) but the password still remains.
Any help is greatly appreciated; I really need these drives
P.S. Plugging it in via a USB HDD enclosure shows as /dev/sdb but does not respond to (c)fdisk or show any partitions (/dev/sdb1 etc).
You could go to a WD site and see if they provide a downloadable low-level format application. If they do, you could try a full drive reformat. That might remove the password protection (and data). Note that a full low-level format can take a long time, so - if you try this approach - I'd suggest you try it first on one of your smallest drives.
The disk lock is a built-in security feature in the disk. It is part of the ATA specification, and thus not specific to any brand or device.
...
Quote:
There is also a program for win32, ArchosUnlock.exe, that creates a linux boot disk with the below mentioned patched isd200 driver.
A disk always has two passwords: A User password and a Master password. Most disks support a Master Password Revision Code, which can tell you if the Master password has been changed, or it it still the factory default. The revision code is word 92 in the IDENTIFY response. A value of 0xFFFE means the Master password is unchanged.
A disk can be locked in two modes: High security mode or Maximum security mode. Bit 8 in word 128 of the IDENTIFY response tell you which mode your disk is in: 0 = High, 1 = Maximum.
In High security mode, you can unlock the disk with either the user or master password, using the "SECURITY UNLOCK DEVICE" ATA command. There is an attempt limit, normally set to 5, after which you must power cycle or hard-reset the disk before you can attempt again.
In Maximum security mode, you cannot unlock the disk! The only way to get the disk back to a usable state is to issue the SECURITY ERASE PREPARE command, immediately followed by SECURITY ERASE UNIT. The SECURITY ERASE UNIT command requires the Master password and will completely erase all data on the disk. The operation is rather slow, expect half an hour or more for big disks.
PTrenholme's suggestion also sounds promising:
Quote:
You could go to a WD site and see if they provide a downloadable low-level format application.
I can't find a formatting tool on the WD site. I've ran dban on one which I hear is a good wiping tool and that didn't remove the password.
Regarding the rockbox, I have found the atapwd tool to be available on the ultimate boot CD. But when I load it, it sees my CD drive but not my hard drive. I have tried 3 of my hard drives and none show up. I am having to remove the hard drive before booting the live CD otherwise I am asked for the hard drive password immediately after the BIOS screen shows. However, the hard drive is inserted before I load atapwd. I wonder if the BIOS is telling it there's nothing there. The CD drive is set to boot before the hard drive.
Ah, but atapwd website says "The password is empty, so just press enter at the prompt" which leads me to believe that it is true that their software has locked the drive with an empty password. The password on this drive is certainly not blank.
Look at the end of man hdparm for the ATA security feature set. If the password is empty, perhaps a hdparm --security-unlock "" /dev/sdb might do the trick. (Assuming that it's attached as sdb, of course.)
As to the "low level format" for WD, their diagnostic programs offere a "Write zeros to disk, restoring it to 'like new' condition," which might do the trick.
Thanks for you suggestions. I have tried specifying a blank password (both master and user) and it does not unlock. I've also tried every wiping software under the sun.
Out of curiosity, I paid hddunlock.com $10 to unlock an 80GB and to my surprise it actually worked! I am not however prepared to pay $30 for each of my 500GB drives that I want to use.
Any other suggestions? I've spent some time trying to help myself but I'm not getting anywhere. It seems I need some way to crack the password.
Here's a thread that talks about unlocking (and reformatting) a WD drive in a an X-box system that might work for you.
One post I noticed suggested that the (default) WD master password was "all blanks" not "empty." Did you try entering 8 (or 20) blanks as the master password?
Yes, I've tried the wdc and blank passwords but none let me in. I am sure this password is not "default", Tandberg have set their own password; I need a way to crack it.
I presume that you've asked the people from whom you purchased that drives for the password(s). Do they have some reason for not telling you what it is?
Does the hddunlock package report the password or just erase it? (If it reports it, then you could license the unlocking of one drive and, assuming that the "master" password, at least, is the same for all your drive, try to unlock the rest "by hand.")
Have you looked for "forensic" tools? There might be one that can bypass the drive password, although most of the software tools assume that the drive is readable, and, of course, the drive itself reports that it's unreadable unless the correct password is supplied.
> I presume that you've asked the people from whom you purchased
> that drives for the password(s). Do they have some reason for
> not telling you what it is?
I've tried contacting Tandberg but have not had a response. I believe the password is set so that only their drives will work with their "drive bays". The supplier I purchased these from has been completely useless, saying that it's impossible to clear the password (even though I've done it with HDDUnlock, but I don't want to tell them I've done that really).
> Does the hddunlock package report the password or just erase it?
Just clears it.
> Have you tried using something like DBAN on it?
> I've tried using various wiping methods (dd, dban etc.)
Presuming these are fairly cheap drives, and that you have the WD low-level format program, you could try the "brute force" approach: Buy a really strong permanent magnet from your local hardware store and use it it wipe the disk. (I.e, While the disk is unpowered, move the magnet slowly across the drive housing a few times.) That might randomize the "manufacturer" cylinder (and everything else) so you could reformat it. OF COURSE, IT MIGHT COMPLETELY DESTROY THE DRIVE. (Oops: Sorry for shouting - my caps lock stuck. But, hey, it seems worth emphasizing.)
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.