Extreme Privilege Escalation on Windows 8 - UEFI Systems

Extreme Privilege Escalation on Windows 8 - UEFI Systems

Black Hat via YouTube Direct link

Reset vector

39 of 39

39 of 39

Reset vector

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Extreme Privilege Escalation on Windows 8 - UEFI Systems

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Who are we
  3. 3 Outline
  4. 4 Command Prompt
  5. 5 Post exploitation privilege escalation
  6. 6 Post exploitation privilege escalation options
  7. 7 Dark world
  8. 8 Extreme privilege escalation
  9. 9 Target of attack
  10. 10 UEFI
  11. 11 BIOS
  12. 12 UEFI Audit
  13. 13 UEFI Capsule Update
  14. 14 Firmware Capsule
  15. 15 Capsule Update
  16. 16 Coalescing
  17. 17 Cryptographic Verification
  18. 18 Capsule
  19. 19 Bugs
  20. 20 Open Source
  21. 21 Vulnerabilities
  22. 22 Memory Map
  23. 23 Queens Gambit
  24. 24 Dixie
  25. 25 Whitepaper Summary
  26. 26 Live Demo
  27. 27 Warm Reset
  28. 28 Flash Chip
  29. 29 Vulnerability Disclosure Process
  30. 30 Intels Response
  31. 31 Attacked an HP System
  32. 32 Jim Waldron
  33. 33 System Management Mode
  34. 34 How The Watcher Works
  35. 35 Ultimate Nullifier
  36. 36 Ping packets
  37. 37 Manual configuration
  38. 38 Spoof concept
  39. 39 Reset vector

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.