Categories

DEFCON 20: Hacking Measured Boot and UEFI

Posted on Wednesday, February 6th, 2013 in demonstrations, security, tools, Videos by the machinegeek

UEFI secure booting has been on the minds of many hackers and open sources advocates. Some believe that it will lock out certain operating systems in favor of vendor’s proprietary systems. (There have even been recent reports of bricking Samsung laptops just by trying to boot Linux.)

In this video from last Summer’s DEFCON 20 conference, Dan Griffin, President of JW Secure, Inc., demonstrates trusted boot in action, and releases his Measured Boot Tool which allows you to view Trusted Platform Module (TPM) boot data and identify risks such as unsigned early-boot drivers.

This entry was posted on Wednesday, February 6th, 2013 at 8:00 pm and is filed under demonstrations, security, tools, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

One Response to “DEFCON 20: Hacking Measured Boot and UEFI”

  1. Lloyd Atkinson says:

    I agree with the notion that it was designed to lock out (or at least make it harder for less experienced people to run) other operating systems.

    The people behind UEFI claim it is to “make booting more secure” and “prevent boot sector infections”. Seriously, when was the last time someone had even been a victim to a bootsector infection?

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Sjaak: I would add some more protection in the used trigger file (on the serverpilot site) then not using a standard name :) hopefully they use...
  • Pete Castagna: My friend Charlie who worked in synthesizers at a DOD type of place made a modification to this avalanche pulse generator that allowed him to...
  • Sam Catchpole: Yes please :D
  • Giovambattista Matera: another try
  • rumburack: jes