Event
18:00
-
19:00
Day 3
UEFI exploitation
en, de
Assembly-Event
We take a look at UEFI platform initialization firmware such as found on many current mainboards like laptops, desktops and servers. Many security flaws, such as the recently discovered LogoFAIL vulnerability, expose both consumers and organizations to severe risks. What strategies are there to find such issues, and how do we exploit them?
uefi-exploit-logofail.jpg

Exploitation 101

The rough plan is commonly:

  • understanding the system/environment
    • data structures
    • domain specific tools
  • manipulating the system/environment
    • input; this is our exploit :)
  • monitoring the system/environment
    • emulators
    • probes
    • loggers, parsers

Tools

We have prepared a tool to scan memory for EFI data structures: https://github.com/platform-system-interface/ems

Here is a Ghidra plugin to assist: https://github.com/al3xtjames/ghidra-firmware-utils

For inspection and extraction, we can use e.g. Fiedka, the Fiano tool suite's utk and UEFITool.

References

location

just meet at the assembly; no idea what else is available