Главная
Study mode:
on
1
Introduction
2
Who are we
3
Outline
4
Command Prompt
5
Post exploitation privilege escalation
6
Post exploitation privilege escalation options
7
Dark world
8
Extreme privilege escalation
9
Target of attack
10
UEFI
11
BIOS
12
UEFI Audit
13
UEFI Capsule Update
14
Firmware Capsule
15
Capsule Update
16
Coalescing
17
Cryptographic Verification
18
Capsule
19
Bugs
20
Open Source
21
Vulnerabilities
22
Memory Map
23
Queens Gambit
24
Dixie
25
Whitepaper Summary
26
Live Demo
27
Warm Reset
28
Flash Chip
29
Vulnerability Disclosure Process
30
Intels Response
31
Attacked an HP System
32
Jim Waldron
33
System Management Mode
34
How The Watcher Works
35
Ultimate Nullifier
36
Ping packets
37
Manual configuration
38
Spoof concept
39
Reset vector
Description:
Explore extreme privilege escalation techniques on Windows 8 and UEFI systems in this Black Hat conference talk. Delve into the expanded attack surface created by the UEFI specification's runtime services interface and Windows 8's new APIs. Discover two vulnerabilities in Intel's UEFI reference implementation and learn the unique exploitation methods required. Examine topics such as post-exploitation privilege escalation, UEFI audits, firmware capsule updates, and cryptographic verification. Witness a live demonstration of the "Queens Gambit" and "Dixie" vulnerabilities, including warm resets and flash chip manipulation. Gain insights into the vulnerability disclosure process, Intel's response, and attacks on HP systems. Understand the workings of System Management Mode and explore concepts like "The Watcher" and "Ultimate Nullifier." Analyze ping packets, manual configurations, and reset vectors to grasp the full scope of these advanced privilege escalation techniques.

Extreme Privilege Escalation on Windows 8 - UEFI Systems

Black Hat
Add to list