|
You are here |
johv.dk | ||
| | | | |
www.eisfunke.com
|
|
| | | | | I got NixOS to boot with a vanilla UEFI bootloader on a Raspberry Pi 3B thanks to a hybrid MBR. | |
| | | | |
prog.world
|
|
| | | | | [AI summary] The article discusses the use of Intel Processor Trace (PT) technology to capture code traces from the System Management Mode (SMM) in a computer's BIOS. The authors detail the process of creating a backdoor to access SMM, modifying the SMI dispatcher to redirect execution to a custom shellcode, and using tools like WinIPT and ptxed to analyze the trace data. They also mention challenges such as synchronization issues and the need for cross-platform compatibility, and conclude that this method provides an efficient way to investigate SMM code for vulnerabilities. | |
| | | | |
kiljan.org
|
|
| | | | | Official documentation only notes how to make a bootable USB medium for either legacy BIOS or UEFI systems. This guide covers how to make a single USB medium that boots on both. In addition, any leftover space on the USB medium can be used to store Clonezilla images. | |
| | | | |
binarydebt.wordpress.com
|
|
| | | System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it contains pointers to functions which implement system calls. Index of each function pointer in the array is the system call number for that syscall. These are denoted by NR_* macros in header files, such as... | ||