There are no reviews yet. Be the first to send feedback to the community and the maintainers!
CHIPSEC module that exploits UEFI boot script table vulnerability. This vulnerability was discovered by Rafal Wojtczuk and Corey Kallenberg, check original white paper: https://frab.cccv.de/system/attachments/2566/original/venamis_whitepaper.pdf More detailed exploit description: http://blog.cr4.sh/2015/02/exploiting-uefi-boot-script-table.html USAGE: 1) Download and install CHIPSEC (https://github.com/chipsec/chipsec). 2) Download and install Capstone engine incl. Python bindings (http://www.capstone-engine.org). 3) Install nasm (apt-get install nasm). 4) Copy boot_script_table.py into the chipsec/source/tool/chipsec/modules. 5) Run module: # cd chipsec/source/tool/chipsec # python chipsec_main.py --module boot_script_table ADDITIONAL TOOLS: * dma_expl.py is a proof of concept code for Linux operating system that uses software DMA attack to read or write SMRAM contents. * patch_smi_entry.py program uses DMA attack to defeat BIOS_CNTL flash write protection with SMI entries patching. To learn more about these two programs please read my other blog post: http://blog.cr4.sh/2015/09/breaking-uefi-security-with-software.html WARNING: Exploitation of this vulnerability is very hardware-specific because it depends on boot script table format and location. Exploit was tested with following hardware: * Intel DQ77KB motherboard (Q77 chipset) * Apple MacBook Pro 10,2 (late 2012, QM77 chipset) * Lenovo ThinkPad laptops (tested on x220, x230 and others) Running this code on any other hardware may lead to unexpected problems. TODO: * Windows support (current implementation uses rtcwake Linux shell command). * More decent boot script table decoding and dumping (incl. vendor-specific opcodes). * SPI protected ranges dumping and checking. Written by: Dmytro Oleksiuk (aka Cr4sh) [email protected] http://blog.cr4.sh
ThinkPwn
Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0day vulnerability in machines of many vendorss6_pcie_microblaze
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and infoSmmBackdoor
First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for various SMM experiments.MicroBackdoor
Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]openreil
Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)WindowsRegistryRootkit
Kernel rootkit, that lives inside the Windows registry values dataKernelForge
A library to develop kernel level Windows payloads for post HVCI erafwexpl
PC firmware exploitation tool and libraryPeiBackdoor
PEI stage backdoor for UEFI compatible firmwareioctlfuzzer
Automatically exported from code.google.com/p/ioctlfuzzerDrvHide-PoC
Hidden kernel mode code execution for bypassing modern anti-rootkits.IDA-VMware-GDB
Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stubPTBypass-PoC
Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.smram_parse
System Management RAM analysis toolCode-coverage-analysis-tools
Code coverage analysis tools for the PIN ToolkitAptiocalypsis
Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwaresMsFontsFuzz
OpenType font file format fuzzer for Windowssecretnet_expl
LPE exploits for Secret Net and Secret Net Studioqc_debug_monitor
Debug messages monitor for Qualcomm cellular modemszc_pcie_dma
DMA attacks over PCI Express based on Xilinx Zynq-7000 series SoCDbgCb
Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applicationsSimpleUnpacker
Simple tool for unpacking packed/protected malware executables.prl_guest_to_host
Guest to host VM escape exploit for Parallels DesktopIDA-UbiGraph
IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraphblog
Stuff for blog.cr4.sh websiteLove Open Source and this site? Check out how you can help us