CHIPSEC (@chipsec) 's Twitter Profile
CHIPSEC

@chipsec

Open Source Platform Security Assessment Framework

ID: 2453587765

linkhttp://github.com/chipsec/chipsec calendar_today19-04-2014 19:06:13

529 Tweet

2,2K Takipçi

19 Takip Edilen

Eclypsium (@eclypsium) 's Twitter Profile Photo

Eclypsium researchers discovered #BootHoleVulnerability in the GRUB2 bootloader that can be used to gain arbitrary code execution on majority of Linux and Windows based systems, even when they are not using GRUB and Secure Boot is enabled. bit.ly/3g9AYuk

Eclypsium researchers discovered #BootHoleVulnerability in the GRUB2 bootloader that can be used to gain arbitrary code execution on majority of Linux and Windows based systems, even when they are not using GRUB and Secure Boot is enabled. bit.ly/3g9AYuk
Assaf Carlsbad (@assaf_carlsbad) 's Twitter Profile Photo

The first part of liba2k and mine research on UEFI just went online. This time it's merely a refresher on how to dump SPI flash memory, but the next posts in the series will be more innovative and discuss techniques to reverse, debug and fuzz UEFI drivers labs.sentinelone.com/moving-from-co…

Eclypsium (@eclypsium) 's Twitter Profile Photo

TrickBot Now Offers ‘TrickBoot' Vitali Kremez @IntelAdvanced and @Eclypsium have discovered a new module in the TrickBot toolset aimed at detecting UEFI / BIOS firmware vulnerabilities, enabling #malware to persist, brick, and profit. #TrickBoot bit.ly/33DO1Qd

TrickBot Now Offers ‘TrickBoot' <a href="/VK_Intel/">Vitali Kremez</a> @IntelAdvanced and @Eclypsium have discovered a new module in the TrickBot toolset aimed at detecting UEFI / BIOS firmware vulnerabilities, enabling #malware to persist, brick, and profit. #TrickBoot

bit.ly/33DO1Qd
Assaf Carlsbad (@assaf_carlsbad) 's Twitter Profile Photo

Now, cross your fingers and pass this address as an additional argument to the CHIPSEC command. If all goes well, CHIPSEC should now be able to scan the boot script for any potential call-out vulnerabilities. Disclaimer: I only tried this on my own computer. Use at your own risk!

Now, cross your fingers and pass this address as an additional argument to the CHIPSEC command. If all goes well, CHIPSEC should now be able to scan the boot script for any potential call-out vulnerabilities.
Disclaimer: I only tried this on my own computer. Use at your own risk!
Assaf Carlsbad (@assaf_carlsbad) 's Twitter Profile Photo

CHIPSEC now exposes the common.smm_code_chk module that verifies MSR_SMM_FEATURE_CONTROL is configured properly to mitigate SMM callout vulnerabilities.

<a href="/CHIPSEC/">CHIPSEC</a> now exposes the common.smm_code_chk module that verifies MSR_SMM_FEATURE_CONTROL is configured properly to mitigate SMM callout vulnerabilities.
CHIPSEC (@chipsec) 's Twitter Profile Photo

Great point. Can also think of improving s3bootscript module to dump NVRAM directly (rather than read from runtime) and look up the AcpiGlobalVariable in NVRAM

Mickey (@hackingthings) 's Twitter Profile Photo

Want to make your own persistent rootkit? Just sign your native windows binary with one of Hacking Team's revoked code signing certificates and you are all set! eclypsium.com/2021/09/20/eve… Certificate: bit.ly/3CBTfLE

Want to make your own persistent rootkit?

Just sign your native windows binary with one of Hacking Team's revoked code signing certificates and you are all set!
eclypsium.com/2021/09/20/eve…

Certificate: bit.ly/3CBTfLE