Explore >> Select a destination


You are here

johv.dk
| | prog.world
4.5 parsecs away

Travel
| | [AI summary] The article discusses the use of Intel Processor Trace (PT) technology to capture code traces from the System Management Mode (SMM) in a computer's BIOS. The authors detail the process of creating a backdoor to access SMM, modifying the SMI dispatcher to redirect execution to a custom shellcode, and using tools like WinIPT and ptxed to analyze the trace data. They also mention challenges such as synchronization issues and the need for cross-platform compatibility, and conclude that this method provides an efficient way to investigate SMM code for vulnerabilities.
| | www.davidschlachter.com
2.8 parsecs away

Travel
| | Use the EFI shell to boot a newly installed Linux guest in bhyve.
| | www.eisfunke.com
4.4 parsecs away

Travel
| | I got NixOS to boot with a vanilla UEFI bootloader on a Raspberry Pi 3B thanks to a hybrid MBR.
| | sylvaindurand.org
22.7 parsecs away

Travel
| [AI summary] This article provides a detailed guide on installing Arch Linux with full disk encryption on a Dell XPS 9300 using UEFI, covering steps from creating the installation media to configuring the bootloader.