Главная
Study mode:
on
1
Intro
2
About us - Trammell Hudson
3
SOFTWARE EXPLOIT
4
EFI vs UEFI
5
Shared vulnerabilities
6
Vulnerability Case Studies
7
Case study 1: Speed Racer
8
Case study I: Speed Racer
9
Intel® Platform Innovation Framework for EFI Boot Script Specification
10
Case study 2: Darth Venamis
11
Reverse Engineering Mac OS X
12
Why didn't we see Prince Harming?
13
Issues with Apple's EFI Security Update 2015-001
14
Option ROMs
15
Old bugs, new platforms
16
What can vendors do?
17
What can the audience do?
Description:
Explore the vulnerabilities in Mac firmware and their susceptibility to software-only attacks in this 43-minute Black Hat conference talk. Delve into the rising number of firmware vulnerabilities affecting Wintel PC vendors and examine Apple's previous claims of invulnerability. Gain conclusive evidence of Mac's susceptibility to many software-only firmware attacks that also affect PC systems. Witness demonstrations of Mac firmware malware capabilities, emphasizing the potential consequences of successful exploitation. Learn about EFI vs UEFI, shared vulnerabilities, and specific case studies such as Speed Racer and Darth Venamis. Discover the process of reverse engineering Mac OS X and understand the implications of Apple's EFI Security Update 2015-001. Examine the role of Option ROMs and the persistence of old bugs on new platforms. Gain insights into potential actions for both vendors and audience members to address these security concerns.

ThunderStrike 2 - Sith Strike

Black Hat
Add to list
0:00 / 0:00