IT Portfolio β Hardware Security Recovery
Part of an ongoing SOC Analyst portfolio lab build (ADForest.local / Windows Server 2025 / Splunk / BloodHound)
| Field | Detail |
|---|---|
| Device | Intel NUC NUC7i5BNH (Board: NUC7i5BNB) |
| CPU | Intel Core i5-7260U @ 2.20 GHz (Kaby Lake, 7th Gen) |
| RAM | 16 GB DDR4 SO-DIMM |
| Incident Date | 19 January 2026 |
| Resolution Date | 24 January 2026 |
| Cost | Β£64.99 (eBay barebone β BIOS-locked) |
| BIOS Version (post-flash) | BNKBL357.86A.0093.2023.1030.1032 |
| Recovery File | BN0093.bio |
| Final OS | Windows Server 2025 |
| Status | β Fully Operational |
βββ README.md β This file
βββ nuc-bios-recovery-portfolio.html β Full interactive case study (HTML)
βββ images/
βββ 01_ebay-listing.jpg β eBay listing β NUC7i5BNH barebone, Β£64.99
βββ 02_board-overview.jpg β Board fully exposed β top-down view
βββ 03_board-labels-ram.jpg β Board model label (NUC7i5BNB) + 1.2V DDR4 slots
βββ 04_bios-se-jumper.jpg β BIOS_SE security jumper header location
βββ 05_board-m2-area.jpg β M.2 slot and board underside
βββ 06_bios-security-menu.jpg β Aptio V security override menu (jumper removed)
βββ 07_firmware-flash-done.jpg β Firmware flash log β all blocks [done]
βββ 08_f7-update-tool.jpg β F7 BIOS update tool β BN0093.bio detected
βββ 09_post-flash-bios.jpg β Post-flash BIOS setup β BNKBL357.86A.0093, 16GB confirmed
βββ 10_seller-msg-return-offered.jpg β eBay message β return offered by seller
βββ 11_seller-msg-resolved.jpg β eBay message β resolution confirmed 24 Jan
βββ 12_seller-msg-closing.jpg β eBay message β "not an inconvenience but an opportunity"
β View the full case study (live HTML)
| Β | Β |
|---|---|
![]() |
![]() |
| eBay listing β NUC7i5BNH barebone, Β£64.99 | Board fully exposed β NUC7i5BNB |
| Β | Β |
|---|---|
![]() |
![]() |
| Board model label NUC7i5BNB confirmed β 1.2V DDR4 SO-DIMM slots | BIOS_SE 3-pin security jumper header location |

Board underside β M.2 2280 slot and front panel connector area
| Β | Β |
|---|---|
![]() |
![]() |
| Aptio V security override menu β appeared when no .bio detected on USB | Firmware flash log β all blocks [done], ME firmware finalising |
| Β | Β |
|---|---|
![]() |
![]() |
| F7 BIOS Update Tool β BN0093.bio detected, confirmation prompt | Post-flash BIOS setup β version BNKBL357.86A.0093, 16GB RAM confirmed |
| Β | Β |
|---|---|
![]() |
![]() |
| 19 Jan β seller offered full return, challenge accepted instead | 24 Jan β resolution confirmed, device fully operational |

βIt was not an inconvenience but rather an opportunity to learn and develop skills.β
A barebone Intel NUC7i5BNH was purchased for Β£64.99 from an eBay reseller as a second node for a home cybersecurity lab. On first power-on the device presented a BIOS password prompt β the previous owner had left BIOS User and Supervisor passwords set, locking pre-boot access entirely.
The seller offered a full refund. The offer was declined. The device was treated as a practical hardware security recovery challenge, with every step documented as a portfolio artifact.
The NUC7i5BNH uses Aptio V UEFI (AMI-based) with a physical hardware security jumper as a secondary bypass mechanism. Firmware blocks reflashed during recovery:
| Block | Function |
|---|---|
| Boot Block | First code executed on power-on β corruption causes no-POST black screen |
| Main Block | Primary BIOS runtime |
| Recovery Block | Protected fallback region for main block failure |
| BackUp Recovery Block | Secondary recovery fallback |
| Management Engine (ME) | Intel AMT, power management, hardware telemetry |
| Graphic firmware | LSPCON controller for HDMI/DisplayPort output |
| FV Data | Firmware Volume data storage |
BIOS_SE on NUC7i5BNB board); removal triggers security override and enables firmware recovery modePower-on presented BIOS password prompt. System halted at pre-boot authentication. No OS access possible.
BIOS_SE jumper header.bio file is present on USB. Selecting options clears individual components but does not reflash firmwareBN0093.bio from ASUS support page.bio file placed at root onlyFlashing image for Intel(R) Management Engine firmware ... [done]
Flashing image for BackUp Recovery Block firmware ... [done]
Flashing image for Boot Block firmware ... [done]
Flashing image for Recovery Block firmware ... [done]
Flashing image for Main Block firmware ... [done]
Flashing image for Graphic firmware ... [done]
Flashing image for FV Data firmware ... [done]
Flashing image for Intel(R) Management Engine firmware ... [done]
Device restarted automatically. Brief blue screen (LSPCON firmware reinitialisation), then normal POST.
BIOS accessed via F2. F9 loaded optimised defaults. F10 saved. Windows Server 2025 installed. Device operational.
For future reference β confirmed working on NUC7i3BNH / NUC7i5BNH / NUC7i7BNH series.
Step 1 β Prepare recovery USB
BN0093.bio at root directory only β no folders, no renamingStep 2 β Hardware preparation
BIOS_SE)Step 3 β Trigger auto-recovery
Step 4 β Post-flash
F2 (BIOS setup) β F9 (load optimised defaults) β F10 (save and exit)β οΈ If the security menu appears instead of silent flash: The
.biofile was not detected. Verify FAT32 format, file at root, try a different USB drive or port. The menu (passwords / TPM / Recovery options) is a fallback β it does not reflash firmware unlessRecoveryis selected and the file is found.
β οΈ TPM Warning: Clearing the TPM permanently destroys TPM-sealed encryption keys (e.g. BitLocker TPM-only mode). Ensure BitLocker recovery keys are available before proceeding in any enterprise context.
| Area | Detail |
|---|---|
| Hardware Security | Physical BIOS security jumper operation; pre-boot authentication bypass at hardware level |
| Firmware Architecture | Aptio V UEFI block structure; understanding of Boot/Main/Recovery/ME/Graphics blocks |
| Systematic Diagnosis | Root cause identification across multiple failure modes without vendor support |
| Security Awareness | TPM data loss implications; BitLocker/enterprise asset recovery considerations |
| Documentation | Timestamped evidence collection (photos, message logs, firmware screenshots) throughout incident |
| Lab Deployment | Device recovered and deployed as AD lab node running Windows Server 2025 |
This device is the second node in an ongoing home cybersecurity lab:
| *Arturs β IT Portfolio | Case Study: NUC-BIOS-RECOVERY-2026-01* |