My son ended his beautiful life. His passion was computers. would be great if he left some memories on his MBP, 2013 retina. apple unlocked something thy said but would not or could not change the disk password. The most impotrant issue is to preserve the personality of this machine. let's proceed carefully.
unable to boot into SU, no disk listed in password reset, tried many passwords. it's locked up good, did i mention disk encription. forever grateful for the craft
unfortunately, if the disk is encrypted, i don't believe anybody on this forum to be powerful enough to break that encryption.
you mention you cannot boot single-user. is that because there's a firmware password as well? if you boot with ALT, or CMD-R, are you greeted with the padlock screen?
Bootup with alt-cmmd-r is not padlock.
spinning planet earth asking for wifi network, ours not listed. can't type ours in
dont think there is a firmware pass, just user screen password
have two pc laptops, gaming pc linux/ubuntu.
i will buy an apple enclosure if it is the next logical attempt.
is the ssd difficult to remove? and will doing so remove the personality.
the ssd is quite simple to remove. simply remove the bottom lid, and a single screw will release the ssd. it's a blade type. the hardest part will likely be having the correct driver!
that's a quality enclosure which should work fine with the drive. you may likely find a cheaper alternative if you dig around.
you are certain the drive itself is encrypted? have you booted with USB install media and checked the drive with disk utility?
also, forgive me for asking what may be incredibly obvious to you, but are you attempting to boot single-user-mode correctly?
you keep mentioning the "personality" of this mac. if you are referring to keeping your son's data intact and in place, just don't do anything crazy and you'll be fine.
single-user and verbose no go (cmnd-s) (cmnd-v).. found one way to get to white text/code. on startup hold down cmnd-s and cmnd-r. goes to terminal -sh-3.2#
what to code?
can you upload a screenshot? cmd-s sounds like single-user, but cmd-r should boot recovery partition. it's possible to also boot recovery partition and load terminal from there, although it's not quite the same access point.
could you please elaborate on your way to get to "white text/code"?
once i have a better idea where you're at, i'll know where to go
to get to this screen the cmd-s and cmd-r are held down at power up.
tried to do the applesetupdone coding but get timed out or will say file not found
cd/ = no such file or directory
ls =
.DS store System sbin
.Trashes Volumes tmp
.vol bin usr
Applications dev var
Install OS X El Capitan.app etc
Library private
diskutil
Unable to run because unable to use the DiskManagement framework.
Common reasons include. the DiskArbitration framework being unavailable due to booting single-user mode
we are looking for the primary disk (ssd). if the MacBook has 128gb storage, it should be identifiable by that value
the results will be listed in the diskXsY where X is the chronological order of the disks and Y is the order of partitions
our ultimate goal is to attempt to mount the internal storage. this will be the ultimate test if the disk is encrypted, and whether or not we can proceed.
well, disk encryption is beyond the scope of my abilities. apple's lockdown is pretty darn tight.
as daunting a task as it seems, guessing the password is likely the most realistic and affordable means to gaining file access.
you could attempt a brute force attack, which could take years/decades/centuries.
you could order a replacement ssd with enclosure from OWC, and get the MacBook up and running and simply keep the original ssd in the enclosure while you attempt other means of data extraction, but i'm not familiar with any successful decryption methods or anecdotes.
perhaps you find consolation in the fact that grief is conquered in stages, meanwhile this encrypted disk will be a journey the lengths of which remain unknown.
if it's not too great an imposition, i would suggest obtaining an external enclosure. i will root around and see if i can find a means of running a brute force or dictionary attack.
in the meantime, if you have access to email or other personal effects, perhaps you may find some insight into the passwords he preferred. i have only a few passwords which i use for all services, perhaps he was likeminded.
This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.
You have declined cookies. This decision can be reversed.
You have allowed cookies to be placed on your computer. This decision can be reversed.
This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.