07-18-2012 02:58 AM
We have a batch of Dell Latitude E6420's, which use the Seagate Momentus Thin ST320LT014 inside. Now, I have tried the Windows tools and DOS-based tools with this laptop because the user has seemingly destroyed the filesystem (not the hard disk, of course). The Dell Access software is a software layer that integrates this FDE passphrase with Windows user authentication as part of the operating system. The firmware part that loads the auth for the FDE is intact, but the drive filesystem is busted, so cleverly reusing the passphrase and booting into a boot CD to re-image the underlying filesystem and operating system is not possible (do not blame me, blame the handoff between the BIOS and Windows). So, it is essentially the same as me not knowing the passphrase.
I have tried using the FDE Crypt Erase in the most recent ISO of SeaTools for DOS, and it asks me for the passphrase. I have tried the disk encryption passphrase used inside the Dell software, and that does not work. I have tried the "25 digit SID" master SID mentioned in the prompt screen. Problem is that in other brief snippets I picked up on the web, this is the PSID, which on this model is very clearly 32 digits. Trying the full 32 digits or the first 25 digits has not helped. What the heck am I missing here? It says either the BIOS has not properly set the password (which does not make sense) or more realistically the master password has been changed from the original (I would guess that, but the password that we have on file that works in the software, does not work when I enter it in as a master key for the FDE Crypto Master Key).
Has anyone done this successfully? Can anyone tell how this works? I am totally lost and wanted to know if it is time to throw this POS away.