[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)

Hacker at Moabi.com
Sep. 18, 2010
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
1 of 53

More Related Content

What's hot

EMBA - Firmware analysis - Black Hat Arsenal USA 2022EMBA - Firmware analysis - Black Hat Arsenal USA 2022
EMBA - Firmware analysis - Black Hat Arsenal USA 2022MichaelM85042
Linux Kernel Booting Process (2) - For NLKBLinux Kernel Booting Process (2) - For NLKB
Linux Kernel Booting Process (2) - For NLKBshimosawa
U-Boot - An universal bootloader U-Boot - An universal bootloader
U-Boot - An universal bootloader Emertxe Information Technologies Pvt Ltd
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLinaro
Hacking Adobe Experience Manager sitesHacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesMikhail Egorov
Linux Device TreeLinux Device Tree
Linux Device Tree艾鍗科技

Viewers also liked

Boot process: BIOS vs UEFIBoot process: BIOS vs UEFI
Boot process: BIOS vs UEFIAlea Soluciones, S.L.
[DEFCON] Bypassing preboot authentication passwords by instrumenting the BIOS...[DEFCON] Bypassing preboot authentication passwords by instrumenting the BIOS...
[DEFCON] Bypassing preboot authentication passwords by instrumenting the BIOS...Moabi.com
[Defcon24] Introduction to the Witchcraft Compiler Collection[Defcon24] Introduction to the Witchcraft Compiler Collection
[Defcon24] Introduction to the Witchcraft Compiler CollectionMoabi.com
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredAlex Matrosov
Persistent BIOS InfectionPersistent BIOS Infection
Persistent BIOS Infectionguest042636
Integrated version control with Fossil SCMIntegrated version control with Fossil SCM
Integrated version control with Fossil SCMAshberk

Similar to [DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)

DefCon 2012 - Hardware Backdooring (Slides)DefCon 2012 - Hardware Backdooring (Slides)
DefCon 2012 - Hardware Backdooring (Slides)Michael Smith
[Hackito2012] Hardware backdooring is practical[Hackito2012] Hardware backdooring is practical
[Hackito2012] Hardware backdooring is practicalMoabi.com
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & futureAlex Matrosov
Grub2 Booting ProcessGrub2 Booting Process
Grub2 Booting ProcessMike Wang
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...Nicolas Collery
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET

Similar to [DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software) (20)

More from Moabi.com

[2013 syscan360] Jonathan Brossard_katsuni理论介绍以及在沙盒和软件仿真方面的应用[2013 syscan360] Jonathan Brossard_katsuni理论介绍以及在沙盒和软件仿真方面的应用
[2013 syscan360] Jonathan Brossard_katsuni理论介绍以及在沙盒和软件仿真方面的应用Moabi.com
[CCC-28c3] Post Memory Corruption Memory Analysis[CCC-28c3] Post Memory Corruption Memory Analysis
[CCC-28c3] Post Memory Corruption Memory AnalysisMoabi.com
[Ruxcon Monthly Sydney 2011] Proprietary Protocols Reverse Engineering : Rese...[Ruxcon Monthly Sydney 2011] Proprietary Protocols Reverse Engineering : Rese...
[Ruxcon Monthly Sydney 2011] Proprietary Protocols Reverse Engineering : Rese...Moabi.com
[Ruxcon 2011] Post Memory Corruption Memory Analysis[Ruxcon 2011] Post Memory Corruption Memory Analysis
[Ruxcon 2011] Post Memory Corruption Memory AnalysisMoabi.com
[Kiwicon 2011] Post Memory Corruption Memory Analysis[Kiwicon 2011] Post Memory Corruption Memory Analysis
[Kiwicon 2011] Post Memory Corruption Memory AnalysisMoabi.com
[h2hc] Generic exploitation of invalid memory writes[h2hc] Generic exploitation of invalid memory writes
[h2hc] Generic exploitation of invalid memory writesMoabi.com

[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)