Completed
Whitepaper Summary
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Extreme Privilege Escalation on Windows 8 - UEFI Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Who are we
- 3 Outline
- 4 Command Prompt
- 5 Post exploitation privilege escalation
- 6 Post exploitation privilege escalation options
- 7 Dark world
- 8 Extreme privilege escalation
- 9 Target of attack
- 10 UEFI
- 11 BIOS
- 12 UEFI Audit
- 13 UEFI Capsule Update
- 14 Firmware Capsule
- 15 Capsule Update
- 16 Coalescing
- 17 Cryptographic Verification
- 18 Capsule
- 19 Bugs
- 20 Open Source
- 21 Vulnerabilities
- 22 Memory Map
- 23 Queens Gambit
- 24 Dixie
- 25 Whitepaper Summary
- 26 Live Demo
- 27 Warm Reset
- 28 Flash Chip
- 29 Vulnerability Disclosure Process
- 30 Intels Response
- 31 Attacked an HP System
- 32 Jim Waldron
- 33 System Management Mode
- 34 How The Watcher Works
- 35 Ultimate Nullifier
- 36 Ping packets
- 37 Manual configuration
- 38 Spoof concept
- 39 Reset vector