-
サマリー
あらすじ・解説
We talked to Jesse Michael (@jessemichael) and Mickey Shkatov(@hackingthings) about BIOS/UEFI reverse engineering and more! Here’s a list of some of the things we talked about: Eclypsium Driving Down the Rabbit Hole (DEFCON 25 talk about Nissan Leaf exploit) Intel WiGig BIOS Port 0x80 UEFI https://github.com/tianocore/edk2 for UEFI DediProg SF100(And SF600) Chip Clips chipsec UEFITool BusPirate Tigard QEMU VMWare Workstation UEFI exploitation for the masses (DEFCON 26 presentation) One Bootloader to Load Them All (DEFCON 30 presentation) BIOS Dehumidifier Function Remotely Attacking System Firmware (BlackHat 2018) Intel System Studio 2020 Intel DCI USB A/A cable for DCI Debugging Damn Vulnerable UEFI (Look out for BlackHat talk) UEFI DOOM Flappy Bird in UEFI UEFI Tetris Self-Replicating UEFI App (In 420 bytes!) System Management Interrupt Unknown Cheats Forum System Management Mode Edk-devel mailing list Xenoh Kovah’s UEFI training videos efiSeek for ghidra efiXplorer for IDA Binary Ninja Intel Management Engine me_cleaner ME analyzer (By platomav) CPUMicrocodes (By platomav) Coreboot 010 Hex Editor Stardock Fences (For Icon management) Notepad++ The Newlywed Game Streamdeck Toorcamp Have comments or suggestions for us? Find us on twitter