{"id":1647,"date":"2015-06-09T19:47:35","date_gmt":"2015-06-09T17:47:35","guid":{"rendered":"http:\/\/foton.no-ip.com\/blog\/?p=1647"},"modified":"2015-06-09T19:47:35","modified_gmt":"2015-06-09T17:47:35","slug":"smm-x86-bios-security","status":"publish","type":"post","link":"https:\/\/foton.szikraistvan.hu\/blog\/?p=1647","title":{"rendered":"SMM &#8211; x86 BIOS Security"},"content":{"rendered":"<p>Here is my Security update blog post&#8230; of this year, or decade, or ever \ud83d\ude42<\/p>\n<p>Most of us know viruses and even computer viruses, malwares, spywares, and use anti-virus software. Some of us even know rootkits, that run hidden from us (userspace) and sometimes from even the OS.<\/p>\n<p>Do you know what your computer actually does when it boots up, and what is SMM or what the SMI Handler does? (I didn&#8217;t.)<\/p>\n<p>The latest and greatest rootkits now run in System Management Mode (developed and supplied by hackers, NSA &#8230;) started straight from the BIOS. (Before your OS even has a chance to load.)<\/p>\n<p>So don&#8217;t even trust your trusty Live CDs (pendrives&#8230;) to run clean.<\/p>\n<p>So this is the research paper I found:<br \/>\n<a href=\"http:\/\/www.legbacore.com\/Research_files\/HTA-F02_Kovah_v5.pdf\">Are You Giving Firmware Attackers a Free Pass?<\/a> from <a href=\"http:\/\/www.legbacore.com\/Research.html\">legbacore<\/a><br \/>\n<a href=\"https:\/\/youtu.be\/sNYsfUNegEA?t=50s\">Stealing encryption keys after booting into Tails Live OS Video<\/a><\/p>\n<p>Other Info:<br \/>\n<a href=\"http:\/\/www.drdobbs.com\/parallel\/booting-an-intel-architecture-system-par\/232300699?pgno=1\">The Boot up process explained in detail<\/a> <a href=\"http:\/\/www.drdobbs.com\/architecture-and-design\/booting-an-intel-architecture-system-par\/232400476\">[part 2]<\/a><br \/>\n<a href=\"http:\/\/en.wikipedia.org\/wiki\/System_Management_Mode\">System Management Mode<\/a><br \/>\n<a <a href=\"http:\/\/en.wikipedia.org\/wiki\/NSA_ANT_catalog\">NSA implants<\/a><\/p>\n<p>Tools &#038; SW:<br \/>\n<a href=\"http:\/\/www.mitre.org\/publications\/project-stories\/going-deep-into-the-bios-with-mitre-firmware-security-research\">Copernicus<\/a> (<a href=\"http:\/\/www.mitre.org\/research\/technology-transfer\/technology-licensing\/copernicus\">License Request<\/a>)<br \/>\n<a href=\"https:\/\/github.com\/chipsec\/chipsec\">chipsec<\/a><br \/>\n<a href=\"http:\/\/biosbits.org\/\">biosbits<\/a><br \/>\n<a href=\"http:\/\/manpages.ubuntu.com\/manpages\/trusty\/man8\/hwlatdetect.8.html\">hwlatdetect<\/a><br \/>\n<a href=\"http:\/\/en.wikipedia.org\/wiki\/Coreboot\">Coreboot<\/a><\/p>\n<p>Your Phones are not better either&#8230;<br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=i7urtyV6KGo\">Using NAND Flash Bad Block Table to Hide stuff<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is my Security update blog post&#8230; of this year, or decade, or ever \ud83d\ude42 Most of us know viruses and even computer viruses, malwares, spywares, and use anti-virus software. Some of us even know rootkits, that run hidden from &hellip; <a href=\"https:\/\/foton.szikraistvan.hu\/blog\/?p=1647\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[22],"tags":[],"class_list":["post-1647","post","type-post","status-publish","format-standard","hentry","category-informatics"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p3E7AZ-qz","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1647"}],"version-history":[{"count":5,"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1647\/revisions"}],"predecessor-version":[{"id":1652,"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1647\/revisions\/1652"}],"wp:attachment":[{"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/foton.szikraistvan.hu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}