YoVDO

UEFI and the Task of the Translator: Cross-Architecture UEFI Quines for Exploit Development

Offered By: OffensiveCon via YouTube

Tags

UEFI Courses Reverse Engineering Courses Computer Security Courses Exploit Development Courses Binary Analysis Courses RISC-V Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of UEFI exploit development through a conference talk that delves into cross-architecture UEFI quines as a framework. Gain insights into the complexities of UEFI systems and learn innovative approaches to exploit development. Discover how the speaker, Nika Korchok Wakulich, applies the concept of translation to UEFI vulnerabilities, offering a unique perspective on this critical area of cybersecurity. Examine the challenges and opportunities presented by UEFI architecture across different platforms, and understand how quines can be leveraged as a powerful tool in the exploit developer's arsenal. Suitable for security researchers, exploit developers, and those interested in low-level system security, this hour-long presentation from OffensiveCon24 provides a deep dive into advanced UEFI exploitation techniques.

Syllabus

OffensiveCon24 - Nika Korchok Wakulich - UEFI and the Task of the Translator


Taught by

OffensiveCon

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Offensive Penetration Testing
LinkedIn Learning
Penetration Testing: Advanced Kali Linux
LinkedIn Learning
Reverse Engineering Linux 32-bit Applications
PentesterAcademy
Exploit Development and Execution with the Metasploit Framework
Pluralsight