-
Please have another peek into the
#BootPwn kitchen! This exercise uses fault injection which is commonly used to bypass Secure Boot when software vulnerabilities are unknown. Join us at#Nullcon2020 to experience many more ways to bypass Secure Boot!https://asciinema.org/a/xfE7AcLLVYLa1sDOSuFwa5Wki … -
Coding a fun Secure Boot bypass. To be included in "TEE Offensive Core" at
@_ringzer0 and in the#BootPwn experience at@Nullcon -
We (
@pulsoid and me) are looking forward to give the first#BootPwn experience at#nullcon2020 (https://nullcon.net/website/goa-2020/training/bootpwn-pwning-secure-boot-by-experience.php …). Sign up if you want to experience bypassing Secure Boot to execute arbitrary code. Have a peek in the kitchen for one of the labs: https://asciinema.org/a/pmRDbiIIudA7vPzDroGAnvvoL … -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.