CHIPSEC

513 posts

CHIPSEC

CHIPSEC

@CHIPSEC

Open Source Platform Security Assessment Framework

เข้าร่วม Nisan 2014
18 กำลังติดตาม2.4K ผู้ติดตาม
CHIPSEC รีทวีตแล้ว
Mickey
Mickey@HackingThings·
Want to make your own persistent rootkit? Just sign your native windows binary with one of Hacking Team's revoked code signing certificates and you are all set! eclypsium.com/2021/09/20/eve… Certificate: bit.ly/3CBTfLE
Mickey tweet media
English
4
73
210
0
CHIPSEC รีทวีตแล้ว
Assaf Carlsbad
Assaf Carlsbad@assaf_carlsbad·
Now, cross your fingers and pass this address as an additional argument to the CHIPSEC command. If all goes well, CHIPSEC should now be able to scan the boot script for any potential call-out vulnerabilities. Disclaimer: I only tried this on my own computer. Use at your own risk!
Assaf Carlsbad tweet media
English
0
2
5
0
CHIPSEC
CHIPSEC@CHIPSEC·
Great point. Can also think of improving s3bootscript module to dump NVRAM directly (rather than read from runtime) and look up the AcpiGlobalVariable in NVRAM
Assaf Carlsbad@assaf_carlsbad

If you ever encountered a machine where @CHIPSEC fails to obtain and parse the S3 boot script, chances are the 'AcpiGlobalVariable' (which should contain the pointer to the boot script) simply doesn't have the 'Runtime' attribute, and therefore it can't be enumerated from the OS.

English
0
0
3
0
CHIPSEC รีทวีตแล้ว
Maggie
Maggie@_m46s·
I give you the cyberpunk #badgelife Christmas tree of my dreams 🎄☠️ Happy Holidays, everyone!!!
English
17
64
309
0
CHIPSEC รีทวีตแล้ว
Yuriy Bulygin
Yuriy Bulygin@c7zero·
Use @CHIPSEC to play with UEFI variables. Lots of cool stuff there. OS sees a lot fewer variables that there is stored in NVRAM
English
0
10
31
0
CHIPSEC รีทวีตแล้ว
Assaf Carlsbad
Assaf Carlsbad@assaf_carlsbad·
The first part of @liba2k and mine research on UEFI just went online. This time it's merely a refresher on how to dump SPI flash memory, but the next posts in the series will be more innovative and discuss techniques to reverse, debug and fuzz UEFI drivers labs.sentinelone.com/moving-from-co…
English
3
33
77
0
CHIPSEC รีทวีตแล้ว
Eclypsium
Eclypsium@eclypsium·
Eclypsium researchers discovered #BootHoleVulnerability in the GRUB2 bootloader that can be used to gain arbitrary code execution on majority of Linux and Windows based systems, even when they are not using GRUB and Secure Boot is enabled. bit.ly/3g9AYuk
Eclypsium tweet media
English
9
138
195
0