Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

You've Already Been Hacked: What if There Is a Backdoor in Your UEFI OROM?

Автор: Black Hat

Загружено: 2025-03-17

Просмотров: 4485

Описание:

While there have been several studies on inserting malicious code into UEFI OROM (Option ROM), none of them have focused solely on UEFI OROM itself; instead, OROM has been used for auxiliary purposes such as ensuring persistence or as a temporary buffer for lateral movement. Therefore, there is a lack of clarification on what actions a backdoor in UEFI OROM could perform and its potential benefits.

This presentation aims to organize the benefits and infection scenarios of placing a backdoor in UEFI OROM. It will delve deeply into the stealthiness and potency of OROM backdoors, followed by demonstrations of three novel PoC OROM backdoors targeting Windows. This PoC utilizes multiple novel evasion techniques, including communication with a C2 server during boot, execution of malicious code at both kernel and userland levels solely through a runtime DXE driver, concealing malicious tasks during the boot phase, and bypassing CFG/ACG using partial identity mapping. Lastly, strategies for defending systems against OROM backdoors will be discussed, along with an introduction to the research and initiatives needed for such protection.

By:
Kazuki Matsuo | Security Researcher, Waseda University and FFRI Security

Full Abstract and Presentation Materials:
https://www.blackhat.com/us-24/briefi...

You've Already Been Hacked: What if There Is a Backdoor in Your UEFI OROM?

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls

Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls

What Lies Beneath the Surface? Evaluating LLMs for Offensive Cyber Capabilities

What Lies Beneath the Surface? Evaluating LLMs for Offensive Cyber Capabilities

Путин предложил Трампу миллиард. В Адыгее нашли тела под завалами. Сделка по Гренландии

Путин предложил Трампу миллиард. В Адыгее нашли тела под завалами. Сделка по Гренландии

Practical LLM Security: Takeaways From a Year in the Trenches

Practical LLM Security: Takeaways From a Year in the Trenches

DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin  Yu

DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin Yu

WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys

WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys

How the Best Hackers Learn Their Craft

How the Best Hackers Learn Their Craft

You Shall Not PASS - Analysing a NSO iOS Spyware Sample

You Shall Not PASS - Analysing a NSO iOS Spyware Sample

⚡️ Кремль экстренно созвал Совбез || Путин принимает условия США

⚡️ Кремль экстренно созвал Совбез || Путин принимает условия США

DEF CON 33 - How Not to IoT:Lessons in Security Failures - Zoltan

DEF CON 33 - How Not to IoT:Lessons in Security Failures - Zoltan "zh4ck" Balazs

Президент выводит войска? / Спецборт срочно вылетел в Москву

Президент выводит войска? / Спецборт срочно вылетел в Москву

For 9 Years Tor Ignored Princeton's Proof: BGP Attacks Can Unmask Millions of Users

For 9 Years Tor Ignored Princeton's Proof: BGP Attacks Can Unmask Millions of Users

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation

NSA Backdoor in Windows? This and more from the guy who created Windows Task Manager!

NSA Backdoor in Windows? This and more from the guy who created Windows Task Manager!

38C3 - Hacking the RP2350

38C3 - Hacking the RP2350

Взлом микропроцессора — Reverse Engineer покажет вам, как это сделать

Взлом микропроцессора — Reverse Engineer покажет вам, как это сделать

Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote Attack Surface

Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote Attack Surface

Lost in Translation: Exploiting Unicode Normalization

Lost in Translation: Exploiting Unicode Normalization

38C3 - ACE up the sleeve: Hacking into Apple's new USB-C Controller

38C3 - ACE up the sleeve: Hacking into Apple's new USB-C Controller

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com