BIOS-recovery

πŸ”§ Case Study: BIOS Password Recovery & Firmware Reflash β€” Intel NUC7i5BNH

IT Portfolio β€” Hardware Security Recovery
Part of an ongoing SOC Analyst portfolio lab build (ADForest.local / Windows Server 2025 / Splunk / BloodHound)


πŸ“‹ Summary

Field Detail
Device Intel NUC NUC7i5BNH (Board: NUC7i5BNB)
CPU Intel Core i5-7260U @ 2.20 GHz (Kaby Lake, 7th Gen)
RAM 16 GB DDR4 SO-DIMM
Incident Date 19 January 2026
Resolution Date 24 January 2026
Cost Β£64.99 (eBay barebone β€” BIOS-locked)
BIOS Version (post-flash) BNKBL357.86A.0093.2023.1030.1032
Recovery File BN0093.bio
Final OS Windows Server 2025
Status βœ… Fully Operational

πŸ—‚οΈ Repository Contents

β”œβ”€β”€ README.md                              ← This file
β”œβ”€β”€ nuc-bios-recovery-portfolio.html       ← Full interactive case study (HTML)
└── images/
    β”œβ”€β”€ 01_ebay-listing.jpg                ← eBay listing β€” NUC7i5BNH barebone, Β£64.99
    β”œβ”€β”€ 02_board-overview.jpg              ← Board fully exposed β€” top-down view
    β”œβ”€β”€ 03_board-labels-ram.jpg            ← Board model label (NUC7i5BNB) + 1.2V DDR4 slots
    β”œβ”€β”€ 04_bios-se-jumper.jpg              ← BIOS_SE security jumper header location
    β”œβ”€β”€ 05_board-m2-area.jpg               ← M.2 slot and board underside
    β”œβ”€β”€ 06_bios-security-menu.jpg          ← Aptio V security override menu (jumper removed)
    β”œβ”€β”€ 07_firmware-flash-done.jpg         ← Firmware flash log β€” all blocks [done]
    β”œβ”€β”€ 08_f7-update-tool.jpg              ← F7 BIOS update tool β€” BN0093.bio detected
    β”œβ”€β”€ 09_post-flash-bios.jpg             ← Post-flash BIOS setup β€” BNKBL357.86A.0093, 16GB confirmed
    β”œβ”€β”€ 10_seller-msg-return-offered.jpg   ← eBay message β€” return offered by seller
    β”œβ”€β”€ 11_seller-msg-resolved.jpg         ← eBay message β€” resolution confirmed 24 Jan
    └── 12_seller-msg-closing.jpg          ← eBay message β€” "not an inconvenience but an opportunity"

β†’ View the full case study (live HTML)


Device & Purchase

Β  Β 
eBay listing Board overview
eBay listing β€” NUC7i5BNH barebone, Β£64.99 Board fully exposed β€” NUC7i5BNB

Hardware Internals

Β  Β 
Board labels and RAM BIOS_SE jumper
Board model label NUC7i5BNB confirmed β€” 1.2V DDR4 SO-DIMM slots BIOS_SE 3-pin security jumper header location

M.2 slot area
Board underside β€” M.2 2280 slot and front panel connector area

BIOS & Firmware

Β  Β 
BIOS security menu Firmware flash done
Aptio V security override menu β€” appeared when no .bio detected on USB Firmware flash log β€” all blocks [done], ME firmware finalising
Β  Β 
F7 update tool Post-flash BIOS
F7 BIOS Update Tool β€” BN0093.bio detected, confirmation prompt Post-flash BIOS setup β€” version BNKBL357.86A.0093, 16GB RAM confirmed

Seller Communication

Β  Β 
Seller return offer Resolution confirmed
19 Jan β€” seller offered full return, challenge accepted instead 24 Jan β€” resolution confirmed, device fully operational

Closing message
β€œIt was not an inconvenience but rather an opportunity to learn and develop skills.”


πŸ” Background

A barebone Intel NUC7i5BNH was purchased for Β£64.99 from an eBay reseller as a second node for a home cybersecurity lab. On first power-on the device presented a BIOS password prompt β€” the previous owner had left BIOS User and Supervisor passwords set, locking pre-boot access entirely.

The seller offered a full refund. The offer was declined. The device was treated as a practical hardware security recovery challenge, with every step documented as a portfolio artifact.


βš™οΈ Technical Scope

BIOS Architecture Involved

The NUC7i5BNH uses Aptio V UEFI (AMI-based) with a physical hardware security jumper as a secondary bypass mechanism. Firmware blocks reflashed during recovery:

Block Function
Boot Block First code executed on power-on β€” corruption causes no-POST black screen
Main Block Primary BIOS runtime
Recovery Block Protected fallback region for main block failure
BackUp Recovery Block Secondary recovery fallback
Management Engine (ME) Intel AMT, power management, hardware telemetry
Graphic firmware LSPCON controller for HDMI/DisplayPort output
FV Data Firmware Volume data storage

Security Mechanisms Encountered


πŸ“… Incident Timeline

19 Jan 2026 β€” 17:43 | Device Received, Password Lock Discovered

Power-on presented BIOS password prompt. System halted at pre-boot authentication. No OS access possible.

19 Jan 2026 β€” ~18:00 | Attempt 1: BIOS Jumper + CMOS Clear

19 Jan 2026 β€” ~18:15 | Attempt 2: Security Override Menu β€” Option 2

19 Jan 2026 β€” ~18:25 | Recovery File Prepared

19 Jan 2026 β€” ~18:35 | F7 Flash Tool Triggered β€” All Blocks Reflashed

Flashing image for Intel(R) Management Engine firmware ... [done]
Flashing image for BackUp Recovery Block firmware      ... [done]
Flashing image for Boot Block firmware                 ... [done]
Flashing image for Recovery Block firmware             ... [done]
Flashing image for Main Block firmware                 ... [done]
Flashing image for Graphic firmware                    ... [done]
Flashing image for FV Data firmware                    ... [done]
Flashing image for Intel(R) Management Engine firmware ... [done]

Device restarted automatically. Brief blue screen (LSPCON firmware reinitialisation), then normal POST.

24 Jan 2026 β€” 01:11 | Full Resolution

BIOS accessed via F2. F9 loaded optimised defaults. F10 saved. Windows Server 2025 installed. Device operational.


πŸ› οΈ Verified Recovery Procedure

For future reference β€” confirmed working on NUC7i3BNH / NUC7i5BNH / NUC7i7BNH series.

Step 1 β€” Prepare recovery USB

Step 2 β€” Hardware preparation

Step 3 β€” Trigger auto-recovery

Step 4 β€” Post-flash

⚠️ If the security menu appears instead of silent flash: The .bio file was not detected. Verify FAT32 format, file at root, try a different USB drive or port. The menu (passwords / TPM / Recovery options) is a fallback β€” it does not reflash firmware unless Recovery is selected and the file is found.

⚠️ TPM Warning: Clearing the TPM permanently destroys TPM-sealed encryption keys (e.g. BitLocker TPM-only mode). Ensure BitLocker recovery keys are available before proceeding in any enterprise context.


🎯 Skills Demonstrated

Area Detail
Hardware Security Physical BIOS security jumper operation; pre-boot authentication bypass at hardware level
Firmware Architecture Aptio V UEFI block structure; understanding of Boot/Main/Recovery/ME/Graphics blocks
Systematic Diagnosis Root cause identification across multiple failure modes without vendor support
Security Awareness TPM data loss implications; BitLocker/enterprise asset recovery considerations
Documentation Timestamped evidence collection (photos, message logs, firmware screenshots) throughout incident
Lab Deployment Device recovered and deployed as AD lab node running Windows Server 2025

πŸ”— Lab Context

This device is the second node in an ongoing home cybersecurity lab:


πŸ“š References


*Arturs β€” IT Portfolio Case Study: NUC-BIOS-RECOVERY-2026-01*