<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>secure boot attack | Dark Mentor LLC</title>
    <link>https://darkmentor.com/tag/secure-boot-attack/</link>
      <atom:link href="https://darkmentor.com/tag/secure-boot-attack/index.xml" rel="self" type="application/rss+xml" />
    <description>secure boot attack</description>
    <generator>Wowchemy (https://wowchemy.com)</generator><language>en-us</language><lastBuildDate>Wed, 14 Oct 2015 00:00:00 +0000</lastBuildDate>
    <image>
      <url>https://darkmentor.com/media/icon_hude17c517e1743818532da6fa743e7f7a_878480_512x512_fill_lanczos_center_3.png</url>
      <title>secure boot attack</title>
      <link>https://darkmentor.com/tag/secure-boot-attack/</link>
    </image>
    
    <item>
      <title>BIOS Necromancy: Utilizing “Dead Code” for BIOS Attacks</title>
      <link>https://darkmentor.com/prior-work/2015-10-hitbgsec/</link>
      <pubDate>Wed, 14 Oct 2015 00:00:00 +0000</pubDate>
      <guid>https://darkmentor.com/prior-work/2015-10-hitbgsec/</guid>
      <description></description>
    </item>
    
    <item>
      <title>Thunderstrike 2: Sith Strike</title>
      <link>https://darkmentor.com/prior-work/2015-08-blackhatusa/</link>
      <pubDate>Thu, 06 Aug 2015 00:00:00 +0000</pubDate>
      <guid>https://darkmentor.com/prior-work/2015-08-blackhatusa/</guid>
      <description></description>
    </item>
    
    <item>
      <title>How Many Million BIOSes Would you Like to Infect?</title>
      <link>https://darkmentor.com/prior-work/2015-03-cansecwest/</link>
      <pubDate>Fri, 20 Mar 2015 00:00:00 +0000</pubDate>
      <guid>https://darkmentor.com/prior-work/2015-03-cansecwest/</guid>
      <description>&lt;p&gt;Unfortunately CanSecWest never released the video of this talk.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Betting BIOS Bugs Won’t Bite Y’er Butt?</title>
      <link>https://darkmentor.com/prior-work/2015-01-shmoocon/</link>
      <pubDate>Fri, 16 Jan 2015 00:00:00 +0000</pubDate>
      <guid>https://darkmentor.com/prior-work/2015-01-shmoocon/</guid>
      <description></description>
    </item>
    
    <item>
      <title>Extreme Privilege Escalation on Windows 8/UEFI Systems</title>
      <link>https://darkmentor.com/prior-work/2014-08-blackhatusa/</link>
      <pubDate>Fri, 08 Aug 2014 00:00:00 +0000</pubDate>
      <guid>https://darkmentor.com/prior-work/2014-08-blackhatusa/</guid>
      <description>&lt;p&gt;This vulnerability (VU#552286) won the &lt;a href=&#34;https://en.wikipedia.org/wiki/Pwnie_Awards&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Pwnie Award for Best Privilege Escalation&lt;/a&gt; in 2014, for its capability to jump from Windows Userspace (with Admin privileges) to SMM.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>SENTER Sandman: Using Intel TXT to Attack BIOSes</title>
      <link>https://darkmentor.com/prior-work/2014-06-summercon/</link>
      <pubDate>Fri, 06 Jun 2014 00:00:00 +0000</pubDate>
      <guid>https://darkmentor.com/prior-work/2014-06-summercon/</guid>
      <description></description>
    </item>
    
    <item>
      <title>Setup For Failure: Defeating Secure Boot</title>
      <link>https://darkmentor.com/prior-work/2014-04-syscan/</link>
      <pubDate>Thu, 03 Apr 2014 00:00:00 +0000</pubDate>
      <guid>https://darkmentor.com/prior-work/2014-04-syscan/</guid>
      <description></description>
    </item>
    
    <item>
      <title>Copernicus 2: SENTER the Dragon!</title>
      <link>https://darkmentor.com/prior-work/2014-03-cansecwest/</link>
      <pubDate>Wed, 12 Mar 2014 00:00:00 +0000</pubDate>
      <guid>https://darkmentor.com/prior-work/2014-03-cansecwest/</guid>
      <description>&lt;p&gt;Unfortunately CanSecWest never posted the conference video for this.&lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>
