Explore >> Select a destination


You are here

nixhacker.com
| | keenlab.tencent.com
3.8 parsecs away

Travel
| | In the past two years, Keen Security Lab did in-depth research on the security of Tesla Cars and presented our research results on Black Hat 2017 and Black Hat 2018. Our research involves many in-veh
| | blog.cr4.sh
3.3 parsecs away

Travel
| | Hi everyone! In this article I'd like to tell you more about UEFI vulnerabilities exploitation. Last time, in " Exploiting UEFI boot script ...
| | prog.world
3.1 parsecs away

Travel
| | [AI summary] The article discusses the use of Intel Processor Trace (PT) technology to capture code traces from the System Management Mode (SMM) in a computer's BIOS. The authors detail the process of creating a backdoor to access SMM, modifying the SMI dispatcher to redirect execution to a custom shellcode, and using tools like WinIPT and ptxed to analyze the trace data. They also mention challenges such as synchronization issues and the need for cross-platform compatibility, and conclude that this method provides an efficient way to investigate SMM code for vulnerabilities.
| | andrewroderos.com
25.7 parsecs away

Travel
| In this blog post, you will learn how to escalate from a command shell to a Meterpreter shell using PowerShell Empire and Metasploit.