Our career paths help you become job ready faster
AI Adoption - Drive Business Value and Organizational Impact
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced UEFI reverse engineering and exploit development techniques in this comprehensive conference talk that delves into the evolution from legacy BIOS to UEFI firmware implementations. Learn about the new challenges and opportunities this transition presents for bootkit development and creative exploit techniques. Master essential UEFI reverse engineering skills through both software testing with emulators and hardware debugging methodologies. Discover assembly programming techniques for developing UEFI shellcode across multiple architectures including x86-64, aarch64, and the often-overlooked EBC (EFI Byte code) architecture. Gain insights into PCI Option ROM hacking and understand how vulnerable image parsing drivers affected by LogoFAIL can be exploited. Examine the intersection of exploit primitives, EBC architecture capabilities, and low-level graphics programming through the presenter's "GOP Complex" research. Understand strategies for identifying new exploit targets within UEFI environments and learn techniques applicable to both seasoned UEFI/BIOS exploit developers and newcomers to platform firmware security. The presentation combines hardware hacking with platform firmware analysis, providing practical knowledge for advancing UEFI proof-of-concept development and understanding the security implications of modern firmware implementations.
Syllabus
Recon 2024 - Nika Korchok Wakulich GOP Complex Image parsing bugs EBC polymorphic engines
Taught by
Recon Conference