Главная
Study mode:
on
1
Introduction
2
Goal
3
Bootkit: Advantages
4
Bootkit: Disadvantages
5
Preparing the Device
6
Dumping the flash
7
The toolchain
8
U-Boot variables
9
Interesting features
10
Backdooring functions printeny
11
U-Boot password protection
12
Hiding from 'strings
13
Demo
14
Planting the bootkit
15
Persistence
16
Detecting Bootkits
17
Secure Boot
18
Bypassing Secureboot
19
Supply Chain attacks
20
(Not-so) Trusted Computing
21
Firmware Security Resources
22
Conclusion
Description:
Explore the inner workings of a custom-developed bootkit for U-Boot based embedded devices in this 33-minute conference talk from Nullcon Goa 2018. Discover how the bootkit achieves persistence at a level lower than firmware, surviving updates and factory resets. Learn about its killswitch functionality, multi-boot technique for switching between regular and backdoored images, and methods to thwart detection. Delve into topics such as dumping flash memory, utilizing toolchains, exploiting U-Boot variables, and backdooring functions. Examine the process of planting the bootkit, ensuring persistence, and potential detection methods. Discuss secure boot, supply chain attacks, and trusted computing concepts. Gain insights into firmware security resources and understand the implications of this advanced IoT cybersecurity threat.

I Boot when U-Boot

nullcon
Add to list
0:00 / 0:00