TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Exploiting UEFI boot script table vulnerability

45 点作者 2510c39011c5超过 10 年前

2 条评论

concernedctzn超过 10 年前
A good writeup and worth it for the links alone. Does a good job of mentioning existing tools and previous talks on the topic.<p>The chipsec tool looks pretty useful for evaluating your setup: <a href="https://github.com/chipsec/chipsec" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;chipsec&#x2F;chipsec</a><p>Also the UEFI parser <a href="https://github.com/theopolis/uefi-firmware-parser" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;theopolis&#x2F;uefi-firmware-parser</a> looks to be really useful if you want to dig deeper.
评论 #9011225 未加载
vanzard超过 10 年前
It is very strange his motherboard splits the BIOS on 2 SPI chips of 2 different sizes. I have never seen a vendor do this. Why?
评论 #9011268 未加载