The UEFI Firmware Rootkits Myths and Reality

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=mAW8Q5_yKb4



Duration: 58:09
17 views
0


Black Hat - Asia - Singapore - 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-133G 4G Intranet Scanning and its Application on the WormHole Vulnerability
2021-12-13Hacking HTTP 2 New Attacks on the Internet's Next Generation Foundation
2021-12-13What Malware Authors Don't Want You to Know Evasive Hollow Process Injection
2021-12-13Cross the Wall Bypass All Modern Mitigations of Microsoft Edge
2021-12-13Myth and Truth About Hypervisor Based Kernel Protector The Reason Why You Need Shadow Box
2021-12-13Hack Microsoft Using Microsoft Signed Binaries Black Hat - Asia - Singapore - 2017
2021-12-13Welcome & Introduction to Black Hat Asia 2017
2021-12-13Cache Side Channel Attack Exploitability and Countermeasures
2021-12-13Mobile Telephony Threats in Asia Black Hat - Asia - Singapore - 2017
2021-12-13Go Get My Vulnerabilities Black Hat - Asia - Singapore - 2017
2021-12-13The UEFI Firmware Rootkits Myths and Reality
2021-12-13Breaking Korea Transit Card with Side Channel Attack Unauthorized Recharging
2021-12-13MASHaBLE Mobile Applications of Secret Handshakes Over Bluetooth LE
2021-12-13Automated Dynamic Fireware Analysis At Scale A Case Study on Embedded Web Interfaces
2021-12-13Keynote Devaluing Attack Disincentivizing Threats Against The Next Billion Devices
2021-12-13Rapid Radio Reversing
2021-12-13Automated Detection of Firefox Extension Reuse Vulnerabilities
2021-12-13Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems
2021-12-13PLC Blaster A worm Living Solely In The PLC Black Hat - Asia - Singapore - 2016
2021-12-13Android Commercial Spyware Disease and Medication
2021-12-13Practical New Developments in The Breach Attack Black Hat - Asia - Singapore - 2016



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering