This document provides an in-depth examination of bootkits, detailing how they achieve persistence below the operating system kernel level and offering detection and prevention advice. It covers various boot processes across different operating systems, low-level technologies such as BIOS, UEFI, and Secure Boot, and discusses multiple case studies and countermeasures against exploitation techniques. The conclusion emphasizes the ongoing potential for vulnerabilities and the importance of adopting common security practices.