How to remove the password from an SSD in a HP ProBook?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}
Apparently someone found it funny to password protect the SSD harddisk of one of our HP ProBook laptops, and now the laptop is unable to boot. Of course the password is unknown to us, but I'd like to reformat the disk so we can reinstall the laptop.
When I boot the laptop, I get the message "3F0 error - Device not found". I took out the harddisk and placed it in a Dell Optiplex 7010, which upon boot asks for the password as well.
If I connect the SSD via a USB adapter, I can see the partitions and format them, but afterwards the drive is still not accessible.
Booting the laptop with a linux live distribution gives me the same result - I can see the partitions just fine, so the drive seems to work.
How do I either remove the password, or more likely, reformat the SSD so I can reinstall the laptop?
Thanks!
windows-7 hard-drive ssd passwords
|
show 10 more comments
Apparently someone found it funny to password protect the SSD harddisk of one of our HP ProBook laptops, and now the laptop is unable to boot. Of course the password is unknown to us, but I'd like to reformat the disk so we can reinstall the laptop.
When I boot the laptop, I get the message "3F0 error - Device not found". I took out the harddisk and placed it in a Dell Optiplex 7010, which upon boot asks for the password as well.
If I connect the SSD via a USB adapter, I can see the partitions and format them, but afterwards the drive is still not accessible.
Booting the laptop with a linux live distribution gives me the same result - I can see the partitions just fine, so the drive seems to work.
How do I either remove the password, or more likely, reformat the SSD so I can reinstall the laptop?
Thanks!
windows-7 hard-drive ssd passwords
1
The password has been set on the SSD itself. On a built-in chip/part of the firmware. The short answer for you: With great difficulty/almost impossible. It'll be far easier for you to replace the disk and re-install, but you'll have almost zero chance of getting the data back from the locked disk.
– Kinnectus
Feb 5 at 10:27
@Kinnectus: I have no need for the data on the locked disk, I just want to use the disk again. Is it possible to reset the SSD to a clean state? Replacing the disk is not possible, as there is no budget for new drives. If I can't reset the SSD, then the laptop will be tossed out, so it would be really nice if I can reuse the SSD!
– Joe
Feb 5 at 10:34
1
No budget for new drives so throw the entire, more expensive laptop away and, what, replace that? Logical. each to their own. Honestly, you'll waste so much time trying to reset the password than will be worth your time simply replacing it. a laptop SSD is less than £100.
– Kinnectus
Feb 5 at 10:43
1
@Kinnectus - "BitLocker is software encryption" - This isn't true. BitLocker will use the broken implementation of a device that supports self-encryption when possible. This is one of those discoveries that happened in 2018. It isn't to say this is a weakness of BitLocker itself, just that, BitLocker doesn't always use software to perform the encryption. To make it clear, BitLocker can use a hardware or software encryption, entirely depends on the configuration.
– Ramhound
Feb 5 at 11:41
1
@Ramhound, good call. Didn't Microsoft, recently, U-turn that Group Policy setting because of the vulnerability...? I.e. The new default setting is to enforce software encryption...
– Kinnectus
Feb 5 at 13:14
|
show 10 more comments
Apparently someone found it funny to password protect the SSD harddisk of one of our HP ProBook laptops, and now the laptop is unable to boot. Of course the password is unknown to us, but I'd like to reformat the disk so we can reinstall the laptop.
When I boot the laptop, I get the message "3F0 error - Device not found". I took out the harddisk and placed it in a Dell Optiplex 7010, which upon boot asks for the password as well.
If I connect the SSD via a USB adapter, I can see the partitions and format them, but afterwards the drive is still not accessible.
Booting the laptop with a linux live distribution gives me the same result - I can see the partitions just fine, so the drive seems to work.
How do I either remove the password, or more likely, reformat the SSD so I can reinstall the laptop?
Thanks!
windows-7 hard-drive ssd passwords
Apparently someone found it funny to password protect the SSD harddisk of one of our HP ProBook laptops, and now the laptop is unable to boot. Of course the password is unknown to us, but I'd like to reformat the disk so we can reinstall the laptop.
When I boot the laptop, I get the message "3F0 error - Device not found". I took out the harddisk and placed it in a Dell Optiplex 7010, which upon boot asks for the password as well.
If I connect the SSD via a USB adapter, I can see the partitions and format them, but afterwards the drive is still not accessible.
Booting the laptop with a linux live distribution gives me the same result - I can see the partitions just fine, so the drive seems to work.
How do I either remove the password, or more likely, reformat the SSD so I can reinstall the laptop?
Thanks!
windows-7 hard-drive ssd passwords
windows-7 hard-drive ssd passwords
asked Feb 5 at 10:16
JoeJoe
54
54
1
The password has been set on the SSD itself. On a built-in chip/part of the firmware. The short answer for you: With great difficulty/almost impossible. It'll be far easier for you to replace the disk and re-install, but you'll have almost zero chance of getting the data back from the locked disk.
– Kinnectus
Feb 5 at 10:27
@Kinnectus: I have no need for the data on the locked disk, I just want to use the disk again. Is it possible to reset the SSD to a clean state? Replacing the disk is not possible, as there is no budget for new drives. If I can't reset the SSD, then the laptop will be tossed out, so it would be really nice if I can reuse the SSD!
– Joe
Feb 5 at 10:34
1
No budget for new drives so throw the entire, more expensive laptop away and, what, replace that? Logical. each to their own. Honestly, you'll waste so much time trying to reset the password than will be worth your time simply replacing it. a laptop SSD is less than £100.
– Kinnectus
Feb 5 at 10:43
1
@Kinnectus - "BitLocker is software encryption" - This isn't true. BitLocker will use the broken implementation of a device that supports self-encryption when possible. This is one of those discoveries that happened in 2018. It isn't to say this is a weakness of BitLocker itself, just that, BitLocker doesn't always use software to perform the encryption. To make it clear, BitLocker can use a hardware or software encryption, entirely depends on the configuration.
– Ramhound
Feb 5 at 11:41
1
@Ramhound, good call. Didn't Microsoft, recently, U-turn that Group Policy setting because of the vulnerability...? I.e. The new default setting is to enforce software encryption...
– Kinnectus
Feb 5 at 13:14
|
show 10 more comments
1
The password has been set on the SSD itself. On a built-in chip/part of the firmware. The short answer for you: With great difficulty/almost impossible. It'll be far easier for you to replace the disk and re-install, but you'll have almost zero chance of getting the data back from the locked disk.
– Kinnectus
Feb 5 at 10:27
@Kinnectus: I have no need for the data on the locked disk, I just want to use the disk again. Is it possible to reset the SSD to a clean state? Replacing the disk is not possible, as there is no budget for new drives. If I can't reset the SSD, then the laptop will be tossed out, so it would be really nice if I can reuse the SSD!
– Joe
Feb 5 at 10:34
1
No budget for new drives so throw the entire, more expensive laptop away and, what, replace that? Logical. each to their own. Honestly, you'll waste so much time trying to reset the password than will be worth your time simply replacing it. a laptop SSD is less than £100.
– Kinnectus
Feb 5 at 10:43
1
@Kinnectus - "BitLocker is software encryption" - This isn't true. BitLocker will use the broken implementation of a device that supports self-encryption when possible. This is one of those discoveries that happened in 2018. It isn't to say this is a weakness of BitLocker itself, just that, BitLocker doesn't always use software to perform the encryption. To make it clear, BitLocker can use a hardware or software encryption, entirely depends on the configuration.
– Ramhound
Feb 5 at 11:41
1
@Ramhound, good call. Didn't Microsoft, recently, U-turn that Group Policy setting because of the vulnerability...? I.e. The new default setting is to enforce software encryption...
– Kinnectus
Feb 5 at 13:14
1
1
The password has been set on the SSD itself. On a built-in chip/part of the firmware. The short answer for you: With great difficulty/almost impossible. It'll be far easier for you to replace the disk and re-install, but you'll have almost zero chance of getting the data back from the locked disk.
– Kinnectus
Feb 5 at 10:27
The password has been set on the SSD itself. On a built-in chip/part of the firmware. The short answer for you: With great difficulty/almost impossible. It'll be far easier for you to replace the disk and re-install, but you'll have almost zero chance of getting the data back from the locked disk.
– Kinnectus
Feb 5 at 10:27
@Kinnectus: I have no need for the data on the locked disk, I just want to use the disk again. Is it possible to reset the SSD to a clean state? Replacing the disk is not possible, as there is no budget for new drives. If I can't reset the SSD, then the laptop will be tossed out, so it would be really nice if I can reuse the SSD!
– Joe
Feb 5 at 10:34
@Kinnectus: I have no need for the data on the locked disk, I just want to use the disk again. Is it possible to reset the SSD to a clean state? Replacing the disk is not possible, as there is no budget for new drives. If I can't reset the SSD, then the laptop will be tossed out, so it would be really nice if I can reuse the SSD!
– Joe
Feb 5 at 10:34
1
1
No budget for new drives so throw the entire, more expensive laptop away and, what, replace that? Logical. each to their own. Honestly, you'll waste so much time trying to reset the password than will be worth your time simply replacing it. a laptop SSD is less than £100.
– Kinnectus
Feb 5 at 10:43
No budget for new drives so throw the entire, more expensive laptop away and, what, replace that? Logical. each to their own. Honestly, you'll waste so much time trying to reset the password than will be worth your time simply replacing it. a laptop SSD is less than £100.
– Kinnectus
Feb 5 at 10:43
1
1
@Kinnectus - "BitLocker is software encryption" - This isn't true. BitLocker will use the broken implementation of a device that supports self-encryption when possible. This is one of those discoveries that happened in 2018. It isn't to say this is a weakness of BitLocker itself, just that, BitLocker doesn't always use software to perform the encryption. To make it clear, BitLocker can use a hardware or software encryption, entirely depends on the configuration.
– Ramhound
Feb 5 at 11:41
@Kinnectus - "BitLocker is software encryption" - This isn't true. BitLocker will use the broken implementation of a device that supports self-encryption when possible. This is one of those discoveries that happened in 2018. It isn't to say this is a weakness of BitLocker itself, just that, BitLocker doesn't always use software to perform the encryption. To make it clear, BitLocker can use a hardware or software encryption, entirely depends on the configuration.
– Ramhound
Feb 5 at 11:41
1
1
@Ramhound, good call. Didn't Microsoft, recently, U-turn that Group Policy setting because of the vulnerability...? I.e. The new default setting is to enforce software encryption...
– Kinnectus
Feb 5 at 13:14
@Ramhound, good call. Didn't Microsoft, recently, U-turn that Group Policy setting because of the vulnerability...? I.e. The new default setting is to enforce software encryption...
– Kinnectus
Feb 5 at 13:14
|
show 10 more comments
1 Answer
1
active
oldest
votes
The purpose of an on-disk password is to prevent access to the data, not to render the drive inoperable.
This means that the only way that you can return the hardware to service is by erasing the drive from scratch, using the on-controller ATA Secure Erase command.
You can boot a Linux live CD and then use the hdparm
command to do this.
https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
If a password is already set, you simply proceed with initiating the erasure with a new password that you select. Using your own arbitrary password will only work for the purpose of initiating a new erasure, not for any other commands that require a password.
# hdparm --user-master u --security-set-pass [password] /dev/sdX
# hdparm --user-master u --security-erase [password] /dev/sdX
(where the 'X' in 'sdX' will vary depending on your hardware).
those were my thoughts as well. It's OK to loose the data, but one should be able to reformat the drive and start again, so to speak. Anyway, thanks for the commands, I tried them with linux live CD but no luck I fear. Both commands give me a similar error message, which isIssuing SECURITY_SET_PASS command, password="1234", user=user, mode=high SG_IO: bad/missing sense data, sb
If I run hdparm -I /dev/sda, there is no security section in the output, which strikes me as odd...
– Joe
Feb 6 at 10:29
See superuser.com/questions/1213715/…. The drive may actually be frozen. Sleep the machine (without rebooting), wake it back up, and try again.
– Royce Williams
Feb 6 at 15:33
Thanks! After booting in Kali, I tried to sleep the machine and wake it again. Nothing changed in the hdparam -I output. I also tried to disconnect the SSD while running and reconnect it again, but with the same result. Still no security section in the output of hdparm -I. It's really frustrating since I can see the drive just fine in linux, and attached via a USB adapter in Windows, I can create & delete partitions, read, write, delete data, but as soon as I try to install Windows on it, the install process fails to find the drive. On boot, the 3F0 error - Device not found still occurs.
– Joe
Feb 7 at 11:39
That sounds like there may be an actual hardware problem with the drive, then.
– Royce Williams
Feb 8 at 16:22
I fear the drive is lost indeed. Since I can't keep spending time on fixing it, both laptop and drive will be scrapped. Thanks for the help anyway!
– Joe
Feb 11 at 6:57
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1402198%2fhow-to-remove-the-password-from-an-ssd-in-a-hp-probook%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
The purpose of an on-disk password is to prevent access to the data, not to render the drive inoperable.
This means that the only way that you can return the hardware to service is by erasing the drive from scratch, using the on-controller ATA Secure Erase command.
You can boot a Linux live CD and then use the hdparm
command to do this.
https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
If a password is already set, you simply proceed with initiating the erasure with a new password that you select. Using your own arbitrary password will only work for the purpose of initiating a new erasure, not for any other commands that require a password.
# hdparm --user-master u --security-set-pass [password] /dev/sdX
# hdparm --user-master u --security-erase [password] /dev/sdX
(where the 'X' in 'sdX' will vary depending on your hardware).
those were my thoughts as well. It's OK to loose the data, but one should be able to reformat the drive and start again, so to speak. Anyway, thanks for the commands, I tried them with linux live CD but no luck I fear. Both commands give me a similar error message, which isIssuing SECURITY_SET_PASS command, password="1234", user=user, mode=high SG_IO: bad/missing sense data, sb
If I run hdparm -I /dev/sda, there is no security section in the output, which strikes me as odd...
– Joe
Feb 6 at 10:29
See superuser.com/questions/1213715/…. The drive may actually be frozen. Sleep the machine (without rebooting), wake it back up, and try again.
– Royce Williams
Feb 6 at 15:33
Thanks! After booting in Kali, I tried to sleep the machine and wake it again. Nothing changed in the hdparam -I output. I also tried to disconnect the SSD while running and reconnect it again, but with the same result. Still no security section in the output of hdparm -I. It's really frustrating since I can see the drive just fine in linux, and attached via a USB adapter in Windows, I can create & delete partitions, read, write, delete data, but as soon as I try to install Windows on it, the install process fails to find the drive. On boot, the 3F0 error - Device not found still occurs.
– Joe
Feb 7 at 11:39
That sounds like there may be an actual hardware problem with the drive, then.
– Royce Williams
Feb 8 at 16:22
I fear the drive is lost indeed. Since I can't keep spending time on fixing it, both laptop and drive will be scrapped. Thanks for the help anyway!
– Joe
Feb 11 at 6:57
add a comment |
The purpose of an on-disk password is to prevent access to the data, not to render the drive inoperable.
This means that the only way that you can return the hardware to service is by erasing the drive from scratch, using the on-controller ATA Secure Erase command.
You can boot a Linux live CD and then use the hdparm
command to do this.
https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
If a password is already set, you simply proceed with initiating the erasure with a new password that you select. Using your own arbitrary password will only work for the purpose of initiating a new erasure, not for any other commands that require a password.
# hdparm --user-master u --security-set-pass [password] /dev/sdX
# hdparm --user-master u --security-erase [password] /dev/sdX
(where the 'X' in 'sdX' will vary depending on your hardware).
those were my thoughts as well. It's OK to loose the data, but one should be able to reformat the drive and start again, so to speak. Anyway, thanks for the commands, I tried them with linux live CD but no luck I fear. Both commands give me a similar error message, which isIssuing SECURITY_SET_PASS command, password="1234", user=user, mode=high SG_IO: bad/missing sense data, sb
If I run hdparm -I /dev/sda, there is no security section in the output, which strikes me as odd...
– Joe
Feb 6 at 10:29
See superuser.com/questions/1213715/…. The drive may actually be frozen. Sleep the machine (without rebooting), wake it back up, and try again.
– Royce Williams
Feb 6 at 15:33
Thanks! After booting in Kali, I tried to sleep the machine and wake it again. Nothing changed in the hdparam -I output. I also tried to disconnect the SSD while running and reconnect it again, but with the same result. Still no security section in the output of hdparm -I. It's really frustrating since I can see the drive just fine in linux, and attached via a USB adapter in Windows, I can create & delete partitions, read, write, delete data, but as soon as I try to install Windows on it, the install process fails to find the drive. On boot, the 3F0 error - Device not found still occurs.
– Joe
Feb 7 at 11:39
That sounds like there may be an actual hardware problem with the drive, then.
– Royce Williams
Feb 8 at 16:22
I fear the drive is lost indeed. Since I can't keep spending time on fixing it, both laptop and drive will be scrapped. Thanks for the help anyway!
– Joe
Feb 11 at 6:57
add a comment |
The purpose of an on-disk password is to prevent access to the data, not to render the drive inoperable.
This means that the only way that you can return the hardware to service is by erasing the drive from scratch, using the on-controller ATA Secure Erase command.
You can boot a Linux live CD and then use the hdparm
command to do this.
https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
If a password is already set, you simply proceed with initiating the erasure with a new password that you select. Using your own arbitrary password will only work for the purpose of initiating a new erasure, not for any other commands that require a password.
# hdparm --user-master u --security-set-pass [password] /dev/sdX
# hdparm --user-master u --security-erase [password] /dev/sdX
(where the 'X' in 'sdX' will vary depending on your hardware).
The purpose of an on-disk password is to prevent access to the data, not to render the drive inoperable.
This means that the only way that you can return the hardware to service is by erasing the drive from scratch, using the on-controller ATA Secure Erase command.
You can boot a Linux live CD and then use the hdparm
command to do this.
https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
If a password is already set, you simply proceed with initiating the erasure with a new password that you select. Using your own arbitrary password will only work for the purpose of initiating a new erasure, not for any other commands that require a password.
# hdparm --user-master u --security-set-pass [password] /dev/sdX
# hdparm --user-master u --security-erase [password] /dev/sdX
(where the 'X' in 'sdX' will vary depending on your hardware).
answered Feb 5 at 21:44
Royce WilliamsRoyce Williams
905613
905613
those were my thoughts as well. It's OK to loose the data, but one should be able to reformat the drive and start again, so to speak. Anyway, thanks for the commands, I tried them with linux live CD but no luck I fear. Both commands give me a similar error message, which isIssuing SECURITY_SET_PASS command, password="1234", user=user, mode=high SG_IO: bad/missing sense data, sb
If I run hdparm -I /dev/sda, there is no security section in the output, which strikes me as odd...
– Joe
Feb 6 at 10:29
See superuser.com/questions/1213715/…. The drive may actually be frozen. Sleep the machine (without rebooting), wake it back up, and try again.
– Royce Williams
Feb 6 at 15:33
Thanks! After booting in Kali, I tried to sleep the machine and wake it again. Nothing changed in the hdparam -I output. I also tried to disconnect the SSD while running and reconnect it again, but with the same result. Still no security section in the output of hdparm -I. It's really frustrating since I can see the drive just fine in linux, and attached via a USB adapter in Windows, I can create & delete partitions, read, write, delete data, but as soon as I try to install Windows on it, the install process fails to find the drive. On boot, the 3F0 error - Device not found still occurs.
– Joe
Feb 7 at 11:39
That sounds like there may be an actual hardware problem with the drive, then.
– Royce Williams
Feb 8 at 16:22
I fear the drive is lost indeed. Since I can't keep spending time on fixing it, both laptop and drive will be scrapped. Thanks for the help anyway!
– Joe
Feb 11 at 6:57
add a comment |
those were my thoughts as well. It's OK to loose the data, but one should be able to reformat the drive and start again, so to speak. Anyway, thanks for the commands, I tried them with linux live CD but no luck I fear. Both commands give me a similar error message, which isIssuing SECURITY_SET_PASS command, password="1234", user=user, mode=high SG_IO: bad/missing sense data, sb
If I run hdparm -I /dev/sda, there is no security section in the output, which strikes me as odd...
– Joe
Feb 6 at 10:29
See superuser.com/questions/1213715/…. The drive may actually be frozen. Sleep the machine (without rebooting), wake it back up, and try again.
– Royce Williams
Feb 6 at 15:33
Thanks! After booting in Kali, I tried to sleep the machine and wake it again. Nothing changed in the hdparam -I output. I also tried to disconnect the SSD while running and reconnect it again, but with the same result. Still no security section in the output of hdparm -I. It's really frustrating since I can see the drive just fine in linux, and attached via a USB adapter in Windows, I can create & delete partitions, read, write, delete data, but as soon as I try to install Windows on it, the install process fails to find the drive. On boot, the 3F0 error - Device not found still occurs.
– Joe
Feb 7 at 11:39
That sounds like there may be an actual hardware problem with the drive, then.
– Royce Williams
Feb 8 at 16:22
I fear the drive is lost indeed. Since I can't keep spending time on fixing it, both laptop and drive will be scrapped. Thanks for the help anyway!
– Joe
Feb 11 at 6:57
those were my thoughts as well. It's OK to loose the data, but one should be able to reformat the drive and start again, so to speak. Anyway, thanks for the commands, I tried them with linux live CD but no luck I fear. Both commands give me a similar error message, which is
Issuing SECURITY_SET_PASS command, password="1234", user=user, mode=high SG_IO: bad/missing sense data, sb
If I run hdparm -I /dev/sda, there is no security section in the output, which strikes me as odd...– Joe
Feb 6 at 10:29
those were my thoughts as well. It's OK to loose the data, but one should be able to reformat the drive and start again, so to speak. Anyway, thanks for the commands, I tried them with linux live CD but no luck I fear. Both commands give me a similar error message, which is
Issuing SECURITY_SET_PASS command, password="1234", user=user, mode=high SG_IO: bad/missing sense data, sb
If I run hdparm -I /dev/sda, there is no security section in the output, which strikes me as odd...– Joe
Feb 6 at 10:29
See superuser.com/questions/1213715/…. The drive may actually be frozen. Sleep the machine (without rebooting), wake it back up, and try again.
– Royce Williams
Feb 6 at 15:33
See superuser.com/questions/1213715/…. The drive may actually be frozen. Sleep the machine (without rebooting), wake it back up, and try again.
– Royce Williams
Feb 6 at 15:33
Thanks! After booting in Kali, I tried to sleep the machine and wake it again. Nothing changed in the hdparam -I output. I also tried to disconnect the SSD while running and reconnect it again, but with the same result. Still no security section in the output of hdparm -I. It's really frustrating since I can see the drive just fine in linux, and attached via a USB adapter in Windows, I can create & delete partitions, read, write, delete data, but as soon as I try to install Windows on it, the install process fails to find the drive. On boot, the 3F0 error - Device not found still occurs.
– Joe
Feb 7 at 11:39
Thanks! After booting in Kali, I tried to sleep the machine and wake it again. Nothing changed in the hdparam -I output. I also tried to disconnect the SSD while running and reconnect it again, but with the same result. Still no security section in the output of hdparm -I. It's really frustrating since I can see the drive just fine in linux, and attached via a USB adapter in Windows, I can create & delete partitions, read, write, delete data, but as soon as I try to install Windows on it, the install process fails to find the drive. On boot, the 3F0 error - Device not found still occurs.
– Joe
Feb 7 at 11:39
That sounds like there may be an actual hardware problem with the drive, then.
– Royce Williams
Feb 8 at 16:22
That sounds like there may be an actual hardware problem with the drive, then.
– Royce Williams
Feb 8 at 16:22
I fear the drive is lost indeed. Since I can't keep spending time on fixing it, both laptop and drive will be scrapped. Thanks for the help anyway!
– Joe
Feb 11 at 6:57
I fear the drive is lost indeed. Since I can't keep spending time on fixing it, both laptop and drive will be scrapped. Thanks for the help anyway!
– Joe
Feb 11 at 6:57
add a comment |
Thanks for contributing an answer to Super User!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1402198%2fhow-to-remove-the-password-from-an-ssd-in-a-hp-probook%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
1
The password has been set on the SSD itself. On a built-in chip/part of the firmware. The short answer for you: With great difficulty/almost impossible. It'll be far easier for you to replace the disk and re-install, but you'll have almost zero chance of getting the data back from the locked disk.
– Kinnectus
Feb 5 at 10:27
@Kinnectus: I have no need for the data on the locked disk, I just want to use the disk again. Is it possible to reset the SSD to a clean state? Replacing the disk is not possible, as there is no budget for new drives. If I can't reset the SSD, then the laptop will be tossed out, so it would be really nice if I can reuse the SSD!
– Joe
Feb 5 at 10:34
1
No budget for new drives so throw the entire, more expensive laptop away and, what, replace that? Logical. each to their own. Honestly, you'll waste so much time trying to reset the password than will be worth your time simply replacing it. a laptop SSD is less than £100.
– Kinnectus
Feb 5 at 10:43
1
@Kinnectus - "BitLocker is software encryption" - This isn't true. BitLocker will use the broken implementation of a device that supports self-encryption when possible. This is one of those discoveries that happened in 2018. It isn't to say this is a weakness of BitLocker itself, just that, BitLocker doesn't always use software to perform the encryption. To make it clear, BitLocker can use a hardware or software encryption, entirely depends on the configuration.
– Ramhound
Feb 5 at 11:41
1
@Ramhound, good call. Didn't Microsoft, recently, U-turn that Group Policy setting because of the vulnerability...? I.e. The new default setting is to enforce software encryption...
– Kinnectus
Feb 5 at 13:14