Overview
Syllabus
Introduction
Who are we
Outline
Command Prompt
Post exploitation privilege escalation
Post exploitation privilege escalation options
Dark world
Extreme privilege escalation
Target of attack
UEFI
BIOS
UEFI Audit
UEFI Capsule Update
Firmware Capsule
Capsule Update
Coalescing
Cryptographic Verification
Capsule
Bugs
Open Source
Vulnerabilities
Memory Map
Queens Gambit
Dixie
Whitepaper Summary
Live Demo
Warm Reset
Flash Chip
Vulnerability Disclosure Process
Intels Response
Attacked an HP System
Jim Waldron
System Management Mode
How The Watcher Works
Ultimate Nullifier
Ping packets
Manual configuration
Spoof concept
Reset vector
Taught by
Black Hat