BIOS Disassembly Ninjutsu Uncovered (Uncovered series)

Explaining protection vulnerabilities, possible exploitation situations, and prevention in a scientific demeanour, this advisor to BIOS exploitation describes the reverse-engineering options used to collect details from BIOS and enlargement ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computing device defense—and the exploitation of embedded x86 BIOS are additionally covered.

Show description

Preview of BIOS Disassembly Ninjutsu Uncovered (Uncovered series) PDF

Best Computer Science books

Web Services, Service-Oriented Architectures, and Cloud Computing, Second Edition: The Savvy Manager's Guide (The Savvy Manager's Guides)

Net prone, Service-Oriented Architectures, and Cloud Computing is a jargon-free, hugely illustrated clarification of ways to leverage the speedily multiplying providers on hand on the web. the way forward for company depends on software program brokers, cellular units, private and non-private clouds, colossal info, and different hugely hooked up know-how.

Software Engineering: Architecture-driven Software Development

Software program Engineering: Architecture-driven software program improvement is the 1st entire advisor to the underlying talents embodied within the IEEE's software program Engineering physique of data (SWEBOK) regular. criteria specialist Richard Schmidt explains the normal software program engineering practices famous for constructing initiatives for presidency or company structures.

Platform Ecosystems: Aligning Architecture, Governance, and Strategy

Platform Ecosystems is a hands-on advisor that gives an entire roadmap for designing and orchestrating vivid software program platform ecosystems. not like software program items which are controlled, the evolution of ecosystems and their myriad members has to be orchestrated via a considerate alignment of structure and governance.

Extra resources for BIOS Disassembly Ninjutsu Uncovered (Uncovered series)

Show sample text content

Three. Decompression Block Relocation and awardext. rom Decompression _143 five. 1. three. four. Extension elements Decompression _ _ _ _ _ _ _ _ _ _ _ 146 five. 1. three. five. unique Intersegment method name 149 VIII Contents • five. 2. AMI 8105 ______160 five. 2. 1. AMI BIOS dossier constitution 161 five. 2. 2. AMI BIOS instruments 162 five. 2. three. AMI Boot-Block opposite Engineering ______ 163 five. 2. three. 1. Boot-Block bounce desk five. 2. three. 2. Decompression Block Relocation 163 ______ a hundred sixty five five. 2. three. three. Decompression Engine Initialization 168 5,2,3. four. BIOS Binary Relocation into RAM a hundred and seventy five. 2. three. five. submit training 177 five. 2. four. AMI procedure BIOS opposite Engineering 182 Cha pter 6: BIOS amendment _______ 187 Preview _______187 6. 1. instruments of the Tmde_______ 188 6,2. Code Injection _______ 193 6. 2. 1. finding the publish leap desk 195 6. 2. 2. discovering a Dummy technique within the submit bounce desk 197 6. 2. three. Assembling the Injected Code 197 6. 2. four. Extracting the true method BIOS two hundred 6. 2. five. searching for Padding Bytes 201 6. 2. 6. Injecting the Code 202 6. 2. 7. enhancing the put up leap desk 202 6. 2. eight. Rebuilding the BIOS Binary 204 6. 2. nine. Flashing the transformed BIOS Binary 204 6. three. different differences 205 Contents IX • half III: enlargement ROM 209 Cha pter 7: PCI Ex pansion ROM software program Develo pment 211 Preview 211 7. 1. PnP BIOS and enlargement ROM structure 212 7. 1. 1. PnP BIOS structure 212 7. 1. 2. "Abusing" PnP BIOS for growth ROM improvement 212 7. 1. three. publish and PCI enlargement ROM Initialization 213 7. 1. four. PCI enlargement XROMBAR 213 7. 1. five. PCI growth ROM 214 7. 1. five. 1. PCI growth ROM Contents 215 7. 1. five. 2. PC-Compatible growth ROMs 218 7. 1. 6. PCI PnP enlargement ROM constitution 221 7. 2. PCI enlargement ROM Peculiarities 222 7. three. Implementation pattern 224 7. three. 1. Testbed 224 7. three. 2. software program improvement device 225 7. three. three. enlargement ROM resource Code 225 7. three. three. 1. middle PCI PnP growth ROM resource Code 226 7. three. three. 2. PCI PnP growth ROM Checksum application resource Code 227 7. three. four. development the pattern 227 7. three. five. checking out the pattern 229 7. three. 6. power computer virus and Its Workaround 230 X Contents $ bankruptcy eight: PCI enlargement ROM opposite Engineering _ _ _ _ _ _ _ 233 Preview - - - - - - -_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 233 eight. 1. Binary structure' _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 234 eight. 2. Disassembling the most Code _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 236 eight. 2. 1. Disassembling Realtek 8139 growth ROM _ _ _ _ _ _ _ _ _ _ 236 eight. 2. 2. Disassembling Gigabyte GV -NX76T2S6D-RH GeForce 7600 GT enlargement ROM _ _ _ _ _ _ _ _ _ _ _ _ _ _ 241 eight. 2. three. A notice on enlargement ROM Code-Injection probability _ _ _ _ _ _ _ _ 244 half IV: BIOS NINIUTSU _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 245 bankruptcy nine: getting access to BIOS in the working process _ _ _ _ _ _ 247 Preview _ _ _ _ _ _ _ __ _ _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ 247 nine. 1. common entry approach _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 248 nine. 2. gaining access to Motherboard BIOS Contents in Linux _ _ _ _ _ _ _ _ _ _ _ 249 nine. 2. 1. advent to j1ash_n_burn 2S 1 nine. 2. 2.

Download PDF sample

Rated 4.45 of 5 – based on 35 votes