Flasher program and file: https://drive.google.com/open?id=0B1OGj4...HFLRkdjWjA
Warning, if opened and the sanity ckecks pass (power connected, etc) it immediately reboots into the flasher EFI binary!
Intel FPTw dump ("results.rar"): https://drive.google.com/open?id=0B1OGj4...09ZY2Y0RUE
The firmware doesn't appear to be RSA protected (it opened in Phoenix Tool and extracted fine, with no "Decrypted" anywhere in the log)!, however the chip is write-protected after boot according to FPTw.
Universal IFR Extractor 0.5 dump (0.6 was down when I tried to download it): https://drive.google.com/open?id=0B1OGj4...G55RmNFYkU
Recovery key combo: Fn+Esc, no need to remove power first, but the filename is unknown.
I tried to use the variable numbers obtained from IFR, but the shell recommended by Falseclock doesn't work and the one I normally use doesn't have the setup_var function...
Rebooting to take some photos
Warning, if opened and the sanity ckecks pass (power connected, etc) it immediately reboots into the flasher EFI binary!
Intel FPTw dump ("results.rar"): https://drive.google.com/open?id=0B1OGj4...09ZY2Y0RUE
The firmware doesn't appear to be RSA protected (it opened in Phoenix Tool and extracted fine, with no "Decrypted" anywhere in the log)!, however the chip is write-protected after boot according to FPTw.
Universal IFR Extractor 0.5 dump (0.6 was down when I tried to download it): https://drive.google.com/open?id=0B1OGj4...G55RmNFYkU
Recovery key combo: Fn+Esc, no need to remove power first, but the filename is unknown.
I tried to use the variable numbers obtained from IFR, but the shell recommended by Falseclock doesn't work and the one I normally use doesn't have the setup_var function...
Rebooting to take some photos