SlideShare a Scribd company logo
1 of 60
Presenter’s Name
Presenter's Position
BETRAYING THE BIOS:
WHERE THE GUARDIANS OF THE BIOS ARE FAILING
Alex Matrosov
@matrosov
Who We Are: Alex Matrosov
Have a lot of fun with UEFI Security and RE
Former Security Researcher @Intel
Reverse Engineering since 1997
Book co-author nostarch.com/rootkits
@matrosov
Agenda Intro
 Attacks on BIOS Updates
 Unsigned Updates
 BIOS protection bits
 SmiFlash and SecSmiFlash
 Intel Boot Guard
 AMI implementation details
 Discover ACM secrets
 Vulns
 Boot Guard Bypass!
 Intel BIOS Guard
 AMI implementation details
All rootkits want to get into Ring 0
Operating System
Before OS loads
Loader (ring 3) Rootkit (ring 0)
MBR/ VBR
(bootcode)
SMM (ring -2)
Loader
(bootcode)
Rootkit (ring 0)
Loader (ring -2) Rootkit (ring 0)
Code
Signing
Policy
Rootkits Bootkits Secure Boot
BIOS
Implants
H
A
R
D
W
A
R
E
More mitigations, more rootkits complexity
Growths of configuration based vulnerabilities
https://www.blackhat.com/docs/us-17/thursday/us-17-Branco-Firmware-Is-The-New-Black-Analyzing-Past-Three-Years-Of-
BIOS-UEFI-Security-Vulnerabilities.pdf
Google Titan Chip
https://cloudplatform.googleblog.com/2017/08/Titan-in-depth-security-in-plaintext.html
BIOS Update Issues
No more legacy! UEFI is everywhere!!
UEFI Firmware
Image
CPU Microcode
Management
Engine
AMT
BMC
SMC
Network
Graphics
Sensors
Embedded
Controller (EC)
PMU
ACM
Boot Guard BIOS Guard TXT
How many different firmware's inside BIOS update?
All the vulnerabilities mention in this research
found inside AMI-based UEFI firmware’s
All Guardians of the BIOS on one slide
FLOCKDN
ACM/ Microcode
BIOS_CNTL
UEFI
Firmware
Image
BIOS Lock Bit
(BLE)
BIOS_WE
SMM_BWP
SPI Write
Protection
(PRx)
BIOS Guard
Boot Guard
Signed Image
Vendor Name BLE SMM_BWP PRx Authenticated
Update
ASUS
+ + - -
MSI
- - - -
Gigabyte
+ + - -
Dell
+ + -+ +
Lenovo
+ + RP +
HP
+ + RP/WP +
Intel
+ + - +
Apple
- - WP +
How different vendors care about security?
blackhat.com/docs/asia-17/materials/asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf
Why so vulnerable?
 BIOS LOCK (BLE) not enabled
(CLVA-2016-12-001/CVE-2017-3197)
 Attacker is able to modify BIOSWE bit
 Attacker can arbitrary write to SPI flash from OS
 FW update process don’t verify signature
 Attacker is able to abuse BIOS updater with signed driver
 SmiFlash Handler multiple vulns
(CLVA-2016-12-002/CVE-2017-3198)
 Attacker can elevate privileges to SMM (ring -2)
How BIOS Update Guardians Fail?
SMM
OS
Update Driver
Memory(DRAM)
Update App
SmiFlash
SecSmiFlash
SPI Flash
Update Image
Ring 3
Ring -2
Ring 0
1
2
3
5
SMIFlash Handler Issues: Gigabyte, Lenovo, MSI
 SmiFlash HANDLERS (SMiFlash.efi)
[BC327DBD-B982-4f55-9F79-056AD7E987C5]
 ENABLE 0x20
 READ 0x21
 ERASE 0x22
 WRITE 0x23
 DISABLE 0x24
 GET_INFO 0x25
 No checks for the input pointers
SmmIsBufferOutsideSmmValid()
SecSMIFlash Handler Issues: ASUS
 SecSmiFlash HANDLERS (SecSMiFlash.efi) 
[3370A4BD-8C23-4565-A2A2-065FEEDE6080]
 LOAD_IMAGE 0x1d
 GET_POLICY 0x1e
 SET_POLICY 0x1f
 No checks for the input pointers
SmmIsBufferOutsideSmmValid()
Responsible Disclosure Fun
 Discovery Date: 2017-04-20
 Intel PSIRT Notified: 2017-05-22
 All the Vendors Notified: 2017-05-26
 Disclosure Notification Date: 2017-05-30
 Lenovo Released a Patch: 2017-07-11
 ASUS Released a Patch: 2017-06-23
 MITRE Assign 6 CVE’s: 2017-07-13
 Gigabyte Released a Patch: 2017-07-25
 Public Disclosure Date: 2017-07-27
https://github.com/CylanceVulnResearch/disclosures
ASUS Responsible Disclosure Fun
Intel Boot Guard
Different shades of Secure Boot
 Secure Boot -> since 2012
 Root of Trust = Firmware -> BIOS
 Attack Surface = Firmware
 Measured Boot (Boot Guard) -> since 2013
 Root of Trust = Hardware -> Trusted Platform Module (TPM)
 Attack Surface = Firmware
 Verified Boot (Boot Guard) -> since 2013
 Root of Trust = Hardware -> Field Programming Fuse (FPF)->Locked
 Attack Surface = Firmware + Hardware
Why Boot Guard has been created?
 Secure Boot starts from DXE phase and impacted with any SMM
issues/implants
 No verification on early boot for SEC/PEI boot phases
 Measured Boot starts before PEI phase but also impacted with
any SMM issues/implants
 The Root of Trust must be locked by hardware (Verified Boot)
 The first step of verification should rely on microcode
authentication
Intel Boot Guard Technology
http://vzimmer.blogspot.com/2013/09/where-do-i-sign-up.html
Boot Guard: Boot Flow
Locked in BIOS
Locked in Hardware
CPU
Microcode
CPU
Reset
Boot Guard
ACM
Reset
Vector
IBB
(SEC + PEI)
Secure Boot
(DXE + BDS)
OS Loader
Intel Boot Guard operating modes
 Not Enabled
 Measured Boot (root of trust = TPM)
 Verified Boot (root of trust = FPF)
 Measured + Verified Boot (root of trust = FPF + TPM)
Demystifying Intel Boot Guard
https://firmware.intel.com/sites/default/files/STTS003%20-%20SF15_STTS003_100f.pdf
Platform Controller Hub (PCH)
Management Engine (ME)
Field Programing Fuse (FPF)
hash of root OEM pub key (SHA-256)
RW UEFI Firmware Image
Key Manifest (KM) Initial Boot Block Manifest
(IBBM)
key manifest security version
number (SVN)
hash of IBB pub key
(SHA-256)
OEM root pub key
(RSA-2048)
RSA signature on KM SVN
+
hash of IBBM pub key
IBBM security version number
(SVN)
hash of IBB (SHA-256)
IBBM pub key (RSA-2048)
RSA signature on IBBM SVN
+
hash of IBB
Boot Guard: Chain of Trust
Demystifying Intel Boot Guard
http://en.community.dell.com/techcenter/extras/m/white_papers/20444061
Vendor Name ME Access EC Access CPU Debugging
(DCI)
Boot Guard Forced
Boot Guard
ACM
Boot
Guard FPF
BIOS Guard
ASUS VivoMini Disabled Disabled Enabled Disabled Disabled Disabled Disabled
MSI Cubi2 Disabled Disabled Enabled Disabled Disabled Disabled Disabled
Gigabyte Brix Read/Write
Enabled
Read/Write
Enabled
Enabled Measured
Verified
Enabled
(FPF not set)
Not Set Disabled
Dell Disabled Disabled Enabled Measured
Verified
Enabled Enabled Enabled
Lenovo
ThinkCentre
Disabled Disabled Enabled Disabled Disabled Disabled Disabled
HP Elitedesk Disabled Disabled Enabled Disabled Disabled Disabled Disabled
Intel NUC Disabled Disabled Enabled Disabled Disabled Disabled Disabled
Apple Read
Enabled
Disabled Disabled Not
Supported
Not
Supported
Not
Supported
Not
Supported
Guard’s Configuration of Tested Hardware
Safeguarding Rootkits: Intel BootGuard
by Alex Ermolov
2016.zeronights.ru/wp-content/uploads/2017/03/Intel-BootGuard.pdf
Grugq
Platform Controller Hub (PCH)
Management Engine (ME)
Field Programing Fuse (FPF)
hash of root OEM pub key (SHA-256)
RW UEFI Firmware Image
Key Manifest (KM) Initial Boot Block Manifest
(IBBM)
key manifest security version
number (SVN)
hash of IBB pub key
(SHA-256)
OEM root pub key
(RSA-2048)
RSA signature on KM SVN
+
hash of IBBM pub key
IBBM security version number
(SVN)
hash of IBB (SHA-256)
IBBM pub key (RSA-2048)
RSA signature on IBBM SVN
+
hash of IBB
Boot Guard: Chain of Trust
Boot Guard: Key Manifest (KM)
Platform Controller Hub (PCH)
Management Engine (ME)
Field Programing Fuse (FPF)
hash of root OEM pub key (SHA-256)
RW UEFI Firmware Image
Key Manifest (KM) Initial Boot Block Manifest
(IBBM)
key manifest security version
number (SVN)
hash of IBB pub key
(SHA-256)
OEM root pub key
(RSA-2048)
RSA signature on KM SVN
+
hash of IBBM pub key
IBBM security version number
(SVN)
hash of IBB (SHA-256)
IBBM pub key (RSA-2048)
RSA signature on IBBM SVN
+
hash of IBB
Boot Guard: Chain of Trust
Boot Guard: Boot Policy Manifest (BPM)
Boot Guard:
Initial Boot
Block (IBB)
Boot Guard: Authenticated Code Module (ACM)
EntryPoint
RSA Pub Key
ACM Header
RSA Exp
RSA Signature
 ACM is x86 (32-bit) code developed by Intel
 ACM executes in AC-RAM (Cache-as-RAM or NEM)
 ACM has CPU and Chipset specifics
 ACM verifies Key Manifest (KEYM) + IBB (IBBM)
Boot Guard: Authenticated Code Module (ACM)
Boot Guard: Authenticated Code Module (ACM)
Boot Guard ACM BinDiff: Haswell vs Skylake
Boot Guard ACM BinDiff: Broadwell vs Skylake
Boot Guard BIOS Components (AMI)
 PEI
 BootGuardPei [B41956E1-7CA2-42db-9562-168389F0F066]
 SMM
 VerifyFwBootGuard [EE89F590-A816-4ac5-B3A9-1BC759B12439]
 DXE
 BootGuardDxe [1DB43EC9-DF5F-4cf5-AAF0-0E85DB4E149A]
BootGuardPei Validation Flow
Boot Guard:
PEI FV_HASH
 FV_HASH_KEY [CBC91F44-A4BC-4A5B-8696-703451D0B053]
VerifyFwBootGuard SMM Validation Flow
(Intel ME communications over HECI)
 Find and Verify ACM
 Verify ACM SVN
 Find and Verify Key Manifest (KM)
 Verify KM SVN
 Find and Verify Boot Policy Manifest (BPM)
 Verify BPM SVN
 If something wrong return EFI_SECURITY_VIOLATION
BootGuardDxe Validation Flow
BootGuardDxe Validation Flow
• https://embedi.com/blog/bypassing-intel-boot-guard
• Intel NUC Boot Guard Bypass CVE-2017-5722 kudos to Alex Ermolov
• https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084
Target Platform
 Gigabyte (GB-BSi7HA-6500)
 Intel 6th generation Core i7 CPU (Skylake) with vPro
 Intel Boot Guard – ENABLED
 Intel BIOS Guard – NOT ENABLED
 Vulnerabilities
 Host Write/Read Access to ME (CVE-2017-11314)
 Intel Boot Guard Configuration not Locked (CVE-2017-11313)
Five steps to bypass Boot Guard
1) Modify UEFI firmware update image with rootkit/implant
or
Disable Intel Boot Guard
2) Initial Boot Block (IBB)
 Recalculate signature on 2048-bit RSA key pair for IBB
 Modify IBB manifest inside UEFI firmware update file
 Recalculate signature for IBB manifest with different 2048-bit RSA key pair
3) Modify Root Key manifest
 Recalculate SHA256 hash of the public key from Root Key Manifest
4) Modify ME region with new key (CVE-2017-11314)
 Modify Boot Guard configuration with active verified boot policy
5) Lock Boot Guard configuration with by FPF (CVE-2017-11313)
Platform Controller Hub (PCH)
Management Engine (ME)
Field Programing Fuse (FPF)
hash of root OEM pub key (SHA-256)
RW UEFI Firmware Image
Key Manifest (KM) Initial Boot Block Manifest
(IBBM)
key manifest security version
number (SVN)
hash of IBB pub key
(SHA-256)
OEM root pub key
(RSA-2048)
RSA signature on KM SVN
+
hash of IBBM pub key
IBBM security version number
(SVN)
hash of IBB (SHA-256)
IBBM pub key (RSA-2048)
RSA signature on IBBM SVN
+
hash of IBB
Boot Guard: Chain of Trust
“Intel provides a 6th and 7th generation Core Platforms
Secure Configuration Specification, which covers how to
securely configure the platform. Additionally, Intel makes
available a utility that our ecosystem partners can use to
test and identify potential configuration issues.”
Intel Statement
“For FPF issue, we discuss with internal the BIOS don’t
need any update but we will add ME Lock tool to our
production process soon, the new production ship will
include ME Lock.”
Gigabyte Statement
UEFITool for Intel Boot Guard visual validation
https://github.com/LongSoft/UEFITool/releases/tag/A43
https://medium.com/@matrosov/bypass-intel-boot-guard-
cc05edfca3a9
All the stuff will be released on public
save the link:
https://github.com/REhints/BlackHat_2017
Thank you for your attention!
Alex Matrosov
@matrosov

More Related Content

What's hot

Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Linaro
 
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...Linaro
 
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesBooting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesChris Simmonds
 
Kernel Recipes 2017 - 20 years of Linux Virtual Memory - Andrea Arcangeli
Kernel Recipes 2017 - 20 years of Linux Virtual Memory - Andrea ArcangeliKernel Recipes 2017 - 20 years of Linux Virtual Memory - Andrea Arcangeli
Kernel Recipes 2017 - 20 years of Linux Virtual Memory - Andrea ArcangeliAnne Nicolas
 
Linux Kernel Booting Process (1) - For NLKB
Linux Kernel Booting Process (1) - For NLKBLinux Kernel Booting Process (1) - For NLKB
Linux Kernel Booting Process (1) - For NLKBshimosawa
 
U-Boot presentation 2013
U-Boot presentation  2013U-Boot presentation  2013
U-Boot presentation 2013Wave Digitech
 
RunX: deploy real-time OSes as containers at the edge
RunX: deploy real-time OSes as containers at the edgeRunX: deploy real-time OSes as containers at the edge
RunX: deploy real-time OSes as containers at the edgeStefano Stabellini
 
Understanding a kernel oops and a kernel panic
Understanding a kernel oops and a kernel panicUnderstanding a kernel oops and a kernel panic
Understanding a kernel oops and a kernel panicJoseph Lu
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLinaro
 
Learning AOSP - Android Booting Process
Learning AOSP - Android Booting ProcessLearning AOSP - Android Booting Process
Learning AOSP - Android Booting ProcessNanik Tolaram
 
Linux Kernel MMC Storage driver Overview
Linux Kernel MMC Storage driver OverviewLinux Kernel MMC Storage driver Overview
Linux Kernel MMC Storage driver OverviewRajKumar Rampelli
 
Understaing Android EGL
Understaing Android EGLUnderstaing Android EGL
Understaing Android EGLSuhan Lee
 
Android internals 07 - Android graphics (rev_1.1)
Android internals 07 - Android graphics (rev_1.1)Android internals 07 - Android graphics (rev_1.1)
Android internals 07 - Android graphics (rev_1.1)Egor Elizarov
 
HKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: IntroductionHKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: IntroductionLinaro
 
Project ACRN hypervisor introduction
Project ACRN hypervisor introduction Project ACRN hypervisor introduction
Project ACRN hypervisor introduction Project ACRN
 
Android Security Internals
Android Security InternalsAndroid Security Internals
Android Security InternalsOpersys inc.
 
Linux Kernel Module - For NLKB
Linux Kernel Module - For NLKBLinux Kernel Module - For NLKB
Linux Kernel Module - For NLKBshimosawa
 

What's hot (20)

Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_
 
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
 
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesBooting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot images
 
Kernel Recipes 2017 - 20 years of Linux Virtual Memory - Andrea Arcangeli
Kernel Recipes 2017 - 20 years of Linux Virtual Memory - Andrea ArcangeliKernel Recipes 2017 - 20 years of Linux Virtual Memory - Andrea Arcangeli
Kernel Recipes 2017 - 20 years of Linux Virtual Memory - Andrea Arcangeli
 
Linux Kernel Booting Process (1) - For NLKB
Linux Kernel Booting Process (1) - For NLKBLinux Kernel Booting Process (1) - For NLKB
Linux Kernel Booting Process (1) - For NLKB
 
U-Boot presentation 2013
U-Boot presentation  2013U-Boot presentation  2013
U-Boot presentation 2013
 
RunX: deploy real-time OSes as containers at the edge
RunX: deploy real-time OSes as containers at the edgeRunX: deploy real-time OSes as containers at the edge
RunX: deploy real-time OSes as containers at the edge
 
Understanding a kernel oops and a kernel panic
Understanding a kernel oops and a kernel panicUnderstanding a kernel oops and a kernel panic
Understanding a kernel oops and a kernel panic
 
Android Booting Scenarios
Android Booting ScenariosAndroid Booting Scenarios
Android Booting Scenarios
 
Embedded Android : System Development - Part III
Embedded Android : System Development - Part IIIEmbedded Android : System Development - Part III
Embedded Android : System Development - Part III
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted Firmware
 
Learning AOSP - Android Booting Process
Learning AOSP - Android Booting ProcessLearning AOSP - Android Booting Process
Learning AOSP - Android Booting Process
 
Linux Kernel MMC Storage driver Overview
Linux Kernel MMC Storage driver OverviewLinux Kernel MMC Storage driver Overview
Linux Kernel MMC Storage driver Overview
 
Understaing Android EGL
Understaing Android EGLUnderstaing Android EGL
Understaing Android EGL
 
Android internals 07 - Android graphics (rev_1.1)
Android internals 07 - Android graphics (rev_1.1)Android internals 07 - Android graphics (rev_1.1)
Android internals 07 - Android graphics (rev_1.1)
 
Zedroid - Android (5.0 and later) on Zedboard
Zedroid - Android (5.0 and later) on ZedboardZedroid - Android (5.0 and later) on Zedboard
Zedroid - Android (5.0 and later) on Zedboard
 
HKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: IntroductionHKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: Introduction
 
Project ACRN hypervisor introduction
Project ACRN hypervisor introduction Project ACRN hypervisor introduction
Project ACRN hypervisor introduction
 
Android Security Internals
Android Security InternalsAndroid Security Internals
Android Security Internals
 
Linux Kernel Module - For NLKB
Linux Kernel Module - For NLKBLinux Kernel Module - For NLKB
Linux Kernel Module - For NLKB
 

Similar to BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing

Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & futureAlex Matrosov
 
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCanSecWest
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET
 
Bootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-releaseBootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-releaseEric Koeppen
 
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...Cristofaro Mune
 
BIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredAlex Matrosov
 
Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605benavrhm
 
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdfUS-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdfAlexYoung899213
 
Persistent BIOS Infection
Persistent BIOS InfectionPersistent BIOS Infection
Persistent BIOS Infectionguest042636
 
Persistent Bios Infection
Persistent Bios InfectionPersistent Bios Infection
Persistent Bios Infectionguest042636
 
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyPEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyRiscure
 
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyPEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyNiek Timmers
 
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the...
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the...[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the...
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the...Moabi.com
 
Upgrade Ubuntu 18.04 Security with Secureboot
Upgrade Ubuntu 18.04 Security with SecurebootUpgrade Ubuntu 18.04 Security with Secureboot
Upgrade Ubuntu 18.04 Security with SecurebootJonathan MICHEL-VILLAZ
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor SkochinskyCODE BLUE
 
Remotely Attacking System Firmware
Remotely Attacking System FirmwareRemotely Attacking System Firmware
Remotely Attacking System FirmwarePriyanka Aash
 

Similar to BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing (20)

Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
 
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Bootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-releaseBootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-release
 
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
 
BIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks Uncovered
 
Slimline Open Firmware
Slimline Open FirmwareSlimline Open Firmware
Slimline Open Firmware
 
BeagleBone Black Booting Process
BeagleBone Black Booting ProcessBeagleBone Black Booting Process
BeagleBone Black Booting Process
 
Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605
 
BeagleBone Black Bootloaders
BeagleBone Black BootloadersBeagleBone Black Bootloaders
BeagleBone Black Bootloaders
 
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdfUS-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
 
BeagleBone Black Bootloaders
BeagleBone Black BootloadersBeagleBone Black Bootloaders
BeagleBone Black Bootloaders
 
Persistent BIOS Infection
Persistent BIOS InfectionPersistent BIOS Infection
Persistent BIOS Infection
 
Persistent Bios Infection
Persistent Bios InfectionPersistent Bios Infection
Persistent Bios Infection
 
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyPEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot Securely
 
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyPEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot Securely
 
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the...
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the...[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the...
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the...
 
Upgrade Ubuntu 18.04 Security with Secureboot
Upgrade Ubuntu 18.04 Security with SecurebootUpgrade Ubuntu 18.04 Security with Secureboot
Upgrade Ubuntu 18.04 Security with Secureboot
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor Skochinsky
 
Remotely Attacking System Firmware
Remotely Attacking System FirmwareRemotely Attacking System Firmware
Remotely Attacking System Firmware
 

More from BlueHat Security Conference

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Security Conference
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Security Conference
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Security Conference
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Security Conference
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Security Conference
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Security Conference
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Security Conference
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Security Conference
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Security Conference
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Security Conference
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Security Conference
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat Security Conference
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat Security Conference
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat Security Conference
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat Security Conference
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat Security Conference
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat Security Conference
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat Security Conference
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat Security Conference
 

More from BlueHat Security Conference (20)

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and well
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing

  • 1. Presenter’s Name Presenter's Position BETRAYING THE BIOS: WHERE THE GUARDIANS OF THE BIOS ARE FAILING Alex Matrosov @matrosov
  • 2. Who We Are: Alex Matrosov Have a lot of fun with UEFI Security and RE Former Security Researcher @Intel Reverse Engineering since 1997 Book co-author nostarch.com/rootkits @matrosov
  • 3. Agenda Intro  Attacks on BIOS Updates  Unsigned Updates  BIOS protection bits  SmiFlash and SecSmiFlash  Intel Boot Guard  AMI implementation details  Discover ACM secrets  Vulns  Boot Guard Bypass!  Intel BIOS Guard  AMI implementation details
  • 4. All rootkits want to get into Ring 0 Operating System Before OS loads Loader (ring 3) Rootkit (ring 0) MBR/ VBR (bootcode) SMM (ring -2) Loader (bootcode) Rootkit (ring 0) Loader (ring -2) Rootkit (ring 0)
  • 5. Code Signing Policy Rootkits Bootkits Secure Boot BIOS Implants H A R D W A R E More mitigations, more rootkits complexity
  • 6. Growths of configuration based vulnerabilities https://www.blackhat.com/docs/us-17/thursday/us-17-Branco-Firmware-Is-The-New-Black-Analyzing-Past-Three-Years-Of- BIOS-UEFI-Security-Vulnerabilities.pdf
  • 9. No more legacy! UEFI is everywhere!!
  • 10. UEFI Firmware Image CPU Microcode Management Engine AMT BMC SMC Network Graphics Sensors Embedded Controller (EC) PMU ACM Boot Guard BIOS Guard TXT How many different firmware's inside BIOS update?
  • 11. All the vulnerabilities mention in this research found inside AMI-based UEFI firmware’s
  • 12. All Guardians of the BIOS on one slide FLOCKDN ACM/ Microcode BIOS_CNTL UEFI Firmware Image BIOS Lock Bit (BLE) BIOS_WE SMM_BWP SPI Write Protection (PRx) BIOS Guard Boot Guard Signed Image
  • 13. Vendor Name BLE SMM_BWP PRx Authenticated Update ASUS + + - - MSI - - - - Gigabyte + + - - Dell + + -+ + Lenovo + + RP + HP + + RP/WP + Intel + + - + Apple - - WP + How different vendors care about security?
  • 14.
  • 16. Why so vulnerable?  BIOS LOCK (BLE) not enabled (CLVA-2016-12-001/CVE-2017-3197)  Attacker is able to modify BIOSWE bit  Attacker can arbitrary write to SPI flash from OS  FW update process don’t verify signature  Attacker is able to abuse BIOS updater with signed driver  SmiFlash Handler multiple vulns (CLVA-2016-12-002/CVE-2017-3198)  Attacker can elevate privileges to SMM (ring -2)
  • 17. How BIOS Update Guardians Fail? SMM OS Update Driver Memory(DRAM) Update App SmiFlash SecSmiFlash SPI Flash Update Image Ring 3 Ring -2 Ring 0 1 2 3 5
  • 18. SMIFlash Handler Issues: Gigabyte, Lenovo, MSI  SmiFlash HANDLERS (SMiFlash.efi) [BC327DBD-B982-4f55-9F79-056AD7E987C5]  ENABLE 0x20  READ 0x21  ERASE 0x22  WRITE 0x23  DISABLE 0x24  GET_INFO 0x25  No checks for the input pointers SmmIsBufferOutsideSmmValid()
  • 19. SecSMIFlash Handler Issues: ASUS  SecSmiFlash HANDLERS (SecSMiFlash.efi)  [3370A4BD-8C23-4565-A2A2-065FEEDE6080]  LOAD_IMAGE 0x1d  GET_POLICY 0x1e  SET_POLICY 0x1f  No checks for the input pointers SmmIsBufferOutsideSmmValid()
  • 20. Responsible Disclosure Fun  Discovery Date: 2017-04-20  Intel PSIRT Notified: 2017-05-22  All the Vendors Notified: 2017-05-26  Disclosure Notification Date: 2017-05-30  Lenovo Released a Patch: 2017-07-11  ASUS Released a Patch: 2017-06-23  MITRE Assign 6 CVE’s: 2017-07-13  Gigabyte Released a Patch: 2017-07-25  Public Disclosure Date: 2017-07-27 https://github.com/CylanceVulnResearch/disclosures
  • 23. Different shades of Secure Boot  Secure Boot -> since 2012  Root of Trust = Firmware -> BIOS  Attack Surface = Firmware  Measured Boot (Boot Guard) -> since 2013  Root of Trust = Hardware -> Trusted Platform Module (TPM)  Attack Surface = Firmware  Verified Boot (Boot Guard) -> since 2013  Root of Trust = Hardware -> Field Programming Fuse (FPF)->Locked  Attack Surface = Firmware + Hardware
  • 24. Why Boot Guard has been created?  Secure Boot starts from DXE phase and impacted with any SMM issues/implants  No verification on early boot for SEC/PEI boot phases  Measured Boot starts before PEI phase but also impacted with any SMM issues/implants  The Root of Trust must be locked by hardware (Verified Boot)  The first step of verification should rely on microcode authentication
  • 25. Intel Boot Guard Technology http://vzimmer.blogspot.com/2013/09/where-do-i-sign-up.html
  • 26. Boot Guard: Boot Flow Locked in BIOS Locked in Hardware CPU Microcode CPU Reset Boot Guard ACM Reset Vector IBB (SEC + PEI) Secure Boot (DXE + BDS) OS Loader
  • 27. Intel Boot Guard operating modes  Not Enabled  Measured Boot (root of trust = TPM)  Verified Boot (root of trust = FPF)  Measured + Verified Boot (root of trust = FPF + TPM)
  • 28. Demystifying Intel Boot Guard https://firmware.intel.com/sites/default/files/STTS003%20-%20SF15_STTS003_100f.pdf
  • 29. Platform Controller Hub (PCH) Management Engine (ME) Field Programing Fuse (FPF) hash of root OEM pub key (SHA-256) RW UEFI Firmware Image Key Manifest (KM) Initial Boot Block Manifest (IBBM) key manifest security version number (SVN) hash of IBB pub key (SHA-256) OEM root pub key (RSA-2048) RSA signature on KM SVN + hash of IBBM pub key IBBM security version number (SVN) hash of IBB (SHA-256) IBBM pub key (RSA-2048) RSA signature on IBBM SVN + hash of IBB Boot Guard: Chain of Trust
  • 30. Demystifying Intel Boot Guard http://en.community.dell.com/techcenter/extras/m/white_papers/20444061
  • 31. Vendor Name ME Access EC Access CPU Debugging (DCI) Boot Guard Forced Boot Guard ACM Boot Guard FPF BIOS Guard ASUS VivoMini Disabled Disabled Enabled Disabled Disabled Disabled Disabled MSI Cubi2 Disabled Disabled Enabled Disabled Disabled Disabled Disabled Gigabyte Brix Read/Write Enabled Read/Write Enabled Enabled Measured Verified Enabled (FPF not set) Not Set Disabled Dell Disabled Disabled Enabled Measured Verified Enabled Enabled Enabled Lenovo ThinkCentre Disabled Disabled Enabled Disabled Disabled Disabled Disabled HP Elitedesk Disabled Disabled Enabled Disabled Disabled Disabled Disabled Intel NUC Disabled Disabled Enabled Disabled Disabled Disabled Disabled Apple Read Enabled Disabled Disabled Not Supported Not Supported Not Supported Not Supported Guard’s Configuration of Tested Hardware
  • 32.
  • 33. Safeguarding Rootkits: Intel BootGuard by Alex Ermolov 2016.zeronights.ru/wp-content/uploads/2017/03/Intel-BootGuard.pdf
  • 34. Grugq
  • 35. Platform Controller Hub (PCH) Management Engine (ME) Field Programing Fuse (FPF) hash of root OEM pub key (SHA-256) RW UEFI Firmware Image Key Manifest (KM) Initial Boot Block Manifest (IBBM) key manifest security version number (SVN) hash of IBB pub key (SHA-256) OEM root pub key (RSA-2048) RSA signature on KM SVN + hash of IBBM pub key IBBM security version number (SVN) hash of IBB (SHA-256) IBBM pub key (RSA-2048) RSA signature on IBBM SVN + hash of IBB Boot Guard: Chain of Trust
  • 36. Boot Guard: Key Manifest (KM)
  • 37. Platform Controller Hub (PCH) Management Engine (ME) Field Programing Fuse (FPF) hash of root OEM pub key (SHA-256) RW UEFI Firmware Image Key Manifest (KM) Initial Boot Block Manifest (IBBM) key manifest security version number (SVN) hash of IBB pub key (SHA-256) OEM root pub key (RSA-2048) RSA signature on KM SVN + hash of IBBM pub key IBBM security version number (SVN) hash of IBB (SHA-256) IBBM pub key (RSA-2048) RSA signature on IBBM SVN + hash of IBB Boot Guard: Chain of Trust
  • 38. Boot Guard: Boot Policy Manifest (BPM)
  • 39.
  • 41. Boot Guard: Authenticated Code Module (ACM) EntryPoint RSA Pub Key ACM Header RSA Exp RSA Signature
  • 42.  ACM is x86 (32-bit) code developed by Intel  ACM executes in AC-RAM (Cache-as-RAM or NEM)  ACM has CPU and Chipset specifics  ACM verifies Key Manifest (KEYM) + IBB (IBBM) Boot Guard: Authenticated Code Module (ACM)
  • 43. Boot Guard: Authenticated Code Module (ACM)
  • 44. Boot Guard ACM BinDiff: Haswell vs Skylake
  • 45. Boot Guard ACM BinDiff: Broadwell vs Skylake
  • 46. Boot Guard BIOS Components (AMI)  PEI  BootGuardPei [B41956E1-7CA2-42db-9562-168389F0F066]  SMM  VerifyFwBootGuard [EE89F590-A816-4ac5-B3A9-1BC759B12439]  DXE  BootGuardDxe [1DB43EC9-DF5F-4cf5-AAF0-0E85DB4E149A]
  • 48. Boot Guard: PEI FV_HASH  FV_HASH_KEY [CBC91F44-A4BC-4A5B-8696-703451D0B053]
  • 49. VerifyFwBootGuard SMM Validation Flow (Intel ME communications over HECI)  Find and Verify ACM  Verify ACM SVN  Find and Verify Key Manifest (KM)  Verify KM SVN  Find and Verify Boot Policy Manifest (BPM)  Verify BPM SVN  If something wrong return EFI_SECURITY_VIOLATION
  • 51. BootGuardDxe Validation Flow • https://embedi.com/blog/bypassing-intel-boot-guard • Intel NUC Boot Guard Bypass CVE-2017-5722 kudos to Alex Ermolov • https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084
  • 52. Target Platform  Gigabyte (GB-BSi7HA-6500)  Intel 6th generation Core i7 CPU (Skylake) with vPro  Intel Boot Guard – ENABLED  Intel BIOS Guard – NOT ENABLED  Vulnerabilities  Host Write/Read Access to ME (CVE-2017-11314)  Intel Boot Guard Configuration not Locked (CVE-2017-11313)
  • 53.
  • 54. Five steps to bypass Boot Guard 1) Modify UEFI firmware update image with rootkit/implant or Disable Intel Boot Guard 2) Initial Boot Block (IBB)  Recalculate signature on 2048-bit RSA key pair for IBB  Modify IBB manifest inside UEFI firmware update file  Recalculate signature for IBB manifest with different 2048-bit RSA key pair 3) Modify Root Key manifest  Recalculate SHA256 hash of the public key from Root Key Manifest 4) Modify ME region with new key (CVE-2017-11314)  Modify Boot Guard configuration with active verified boot policy 5) Lock Boot Guard configuration with by FPF (CVE-2017-11313)
  • 55. Platform Controller Hub (PCH) Management Engine (ME) Field Programing Fuse (FPF) hash of root OEM pub key (SHA-256) RW UEFI Firmware Image Key Manifest (KM) Initial Boot Block Manifest (IBBM) key manifest security version number (SVN) hash of IBB pub key (SHA-256) OEM root pub key (RSA-2048) RSA signature on KM SVN + hash of IBBM pub key IBBM security version number (SVN) hash of IBB (SHA-256) IBBM pub key (RSA-2048) RSA signature on IBBM SVN + hash of IBB Boot Guard: Chain of Trust
  • 56. “Intel provides a 6th and 7th generation Core Platforms Secure Configuration Specification, which covers how to securely configure the platform. Additionally, Intel makes available a utility that our ecosystem partners can use to test and identify potential configuration issues.” Intel Statement
  • 57. “For FPF issue, we discuss with internal the BIOS don’t need any update but we will add ME Lock tool to our production process soon, the new production ship will include ME Lock.” Gigabyte Statement
  • 58. UEFITool for Intel Boot Guard visual validation https://github.com/LongSoft/UEFITool/releases/tag/A43 https://medium.com/@matrosov/bypass-intel-boot-guard- cc05edfca3a9
  • 59. All the stuff will be released on public save the link: https://github.com/REhints/BlackHat_2017
  • 60. Thank you for your attention! Alex Matrosov @matrosov