Skip to main content

Questions tagged [uefi]

Unified Extensible Firmware Interface: The interface between the OS and the hardware, and the place where hardware encryption is performed.

3 votes
1 answer
624 views

A lot of systems have secureboot but don't require any password to access bios/efi settings, which means you can disable secureboot without authentication. Additionally, it seems like many Linux ...
zstewart's user avatar
  • 131
1 vote
1 answer
210 views

I have searched online, but have not been able to find anything about this. I understand the PKFail can compromise the boot process by allowing a signed key to sign malware to insert into the UEFI, ...
davidgo's user avatar
  • 713
0 votes
1 answer
247 views

SecureBoot uses a PKI path to verify particular signed bootloader binaries before it runs these binaries. This PKI, as far as I understand, is basically owned by Microsoft, meaning that only Microsoft ...
Jonathan Wilbur's user avatar
2 votes
1 answer
344 views

I found that Thinkpads have hdd password support, which in terms uses some bizarre password hashing and ends up with 90 bits of entropy, which is again used as ATA security password to SED, which in ...
mmja's user avatar
  • 103
1 vote
1 answer
679 views

In my laptop I've set up a bios password when I power on the laptop, and once I enter it the laptop starts my linux distro and decrypts the disk without asking any other password. To do this I've set ...
Allexj's user avatar
  • 137
2 votes
1 answer
4k views

As far as I understand, Secure Boot protects system from running code not signed by a specific vendor(s) during early boot stages. In order to attempt an attack on the bootloader in the first place, ...
nevermind's user avatar
  • 123
0 votes
1 answer
172 views

I want to upload files somewhere to see exactly what their behaviour is, but I’m not sure how. One of them is an EFI file. Does anyone know some website or method, like on a virtual machine, to check ...
pej 's user avatar
  • 1
0 votes
1 answer
234 views

Are there any real examples (malware, rootkits, etc.) of exploiting the UEFI secure boot mechanism vulnerabilities such as CVE-2022-21894?
Artem S. Tashkinov's user avatar
0 votes
1 answer
446 views

As far as I understand, when in CSM mode, UEFI boots using MBR boot sector (from internal hard drive, external USB Flash drive, etc). And when in non-CSM mode, UEFI ignores whole existence of MBR boot ...
KarmaPeasant's user avatar
1 vote
2 answers
1k views

As the title says, can BIOS/UEFI malware pretend that secure boot is enabled? And if so, is there any point to enabling secure boot on a device that came with it disabled (or that you previously ...
NutcaseBackwater16's user avatar
1 vote
2 answers
5k views

FDE tools like VeraCrypt will encrypt the whole system drive when the machine uses legacy boot mode (MBR). But they will only encrypt the system partition if the machine uses EFI boot mode (the EFI ...
stackprotector's user avatar
4 votes
1 answer
529 views

I think that AMD GPUs can be flashed with any modded VBIOS because the GPU doesn't check for firmware signature. Shouldn't the secure boot be able to check signature of the AMD GPUs modded VBIOS and ...
user286874's user avatar
3 votes
0 answers
842 views

I'm redoing my laptop installation from scratch, and this time I want a full secure boot chain. Here's what I did so far : Enroll my own keys in the UEFI firmware Sign my grub bootloader Full disk ...
ShellCode's user avatar
  • 130
-1 votes
1 answer
937 views

I've now googled a lot, but the only information I can find is 'kon-boot hides its code in BIOS memory and changes kernel-code on the fly'... As far as I understand, UEFI initializes devices and tries ...
BlackFlag's user avatar
1 vote
3 answers
1k views

I need to install a computer in a remote location, so that a specific unique user can remotely connect to it via Wireguard VPN. Performance requirements are very low, but security requirements are ...
DevShark's user avatar
  • 353

15 30 50 per page
1
2 3 4 5 6