Главная
Study mode:
on
1
Introduction
2
HDMI Issues
3
BootGuard
4
Overview
5
Free Software Community
6
What Could Go Wrong
7
Logic Analyzer
8
Data Log
9
SetCore
10
Summary
11
Trammell
12
Improved proof of concept
13
Trammell setup
14
Board management controller
15
Supply chain attack
16
Intel response
17
Firmware patches
18
The Fix
19
Open Source Firmware
20
Questions
Description:
Explore TOCTOU attacks against Secure Boot and BootGuard in this Hack In The Box Security Conference talk. Dive into the vulnerabilities of Intel CPUs' BootGuard Verified Boot mode, the core root of trust during the boot process. Learn about errors in firmware volume handling and a new technique for altering firmware post-signature check. Discover how to construct an affordable open-source tool for investigating these Time-of-Check-Time-of-Use (TOCTOU) techniques and apply it to test your own systems' security. Cover topics including HDMI issues, BootGuard overview, free software community concerns, logic analyzer usage, data logging, improved proof of concept, board management controller implications, supply chain attack risks, Intel's response, firmware patches, and the importance of open-source firmware. Gain insights into the complexities of secure boot processes and the ongoing challenges in maintaining a robust chain of trust in modern computing systems.

TOCTOU Attacks Against Secure Boot and BootGuard

Hack In The Box Security Conference
Add to list
0:00 / 0:00