YoVDO

Secrets Of The Motherboard - Shit My Chipset Says

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Hardware Security Courses Security Vulnerabilities Courses Firmware Analysis Courses UEFI Courses

Course Description

Overview

Explore the hidden intricacies of modern motherboards in this 42-minute conference talk from 44CON 2017. Delve into the world of closed-source firmware, undocumented components, and complex security technologies like IME, AMT, SMM, TPM, and UEFI. Discover how understanding these devices at the bare-metal level is more accessible than it appears. Learn about unusual functionalities, potential security pitfalls, and ways to exploit features for building more open platforms. Gain insights into the challenges faced by industries attempting to secure hardware for reuse. Follow along as the speaker uncovers fascinating details from Intel chipset datasheets and other motherboard parts, revealing the secrets that lie within these essential computer components.

Syllabus

Intro
Who is Graham
Where did this all begin
What this talk covers
Previous work
Chipset datasheet
Management engine
Security override
VGA pin
HD Audio
Debug Mode
Prior Research
Neutralisation
ME Flash
partitions
the problem
the circuit
keyboard controller
keyboard strap
ASA
Emmy
Emmy Unlock
Weird Jumper
Docking connectors
Future work
Disable any from software
Architectural issues
Privileged buses
How do we find them
This is not the same motherboard
Internet of Dims
Serial Presence Detect
SPD Chip
SPD Pins
RAM Stick
Fake SPD
Persistence
UEFI BIOS
Failure State
Firmware
SPD Flash
Scratch Registers
Security Secure Reuse
Modify Firmware
System Reflash
Known Good State
Solutions
Hardware Data Sheets
Special Thanks


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube