-
-
Notifications
You must be signed in to change notification settings - Fork 752
Target UEFI
PCILeech is able to target UEFI (Unified Extensible Firmware Interface) also known as BIOS unless the UEFI protects itself from DMA attacks with Vt-d or by other means.
Most computers in 2018 do not protect their UEFI by default. The most noteworthy secure exceptions are Macs and more recent computers from other big brands such as Lenovo.
If a computer is vulnerable in its UEFI mode for DMA attacks PCILeech is able to inject a "kernel" module and hijack execution. This will allow the user to execute arbitrary code in UEFI before the operating system starts. Even if secure boot may be enabled. For more information check out the blog entry Attacking UEFI.
Also check out the YouTube recording from the 34th Chaos Communication Congress below:
Load a "kernel" module by searching for and hooking UEFI BootServices.SignalEvent(), execute sample print to screen shellcode and then unload "kernel" module.
pcileech.exe uefi_textout -kmd UEFI_SIGNAL_EVENT
Load a "kernel" module by hooking and BootServices.ExitBootServices(). Base memory location of UEFI specified manually (IBI SYST table).
pcileech.exe kmdload -kmd UEFI_EXIT_BOOT_SERVICES -efibase 0x7b399018
The ExitBootServices is recommended if targeting an operating system loader. If targeting UEFI itself the SignalEvent hook may be a better choice.
In addition to the examples below please find additional built-in commands and UEFI compatible implants starting with uefi when executing pcileech
without any parameters.
Sponsor PCILeech and MemProcFS:
PCILeech and MemProcFS is free and open source!
I put a lot of time and energy into PCILeech and MemProcFS and related research to make this happen. Some aspects of the projects relate to hardware and I put quite some money into my projects and related research. If you think PCILeech and/or MemProcFS are awesome tools and/or if you had a use for them it's now possible to contribute by becoming a sponsor!
If you like what I've created with PCIleech and MemProcFS with regards to DMA, Memory Analysis and Memory Forensics and would like to give something back to support future development please consider becoming a sponsor at: https://github.com/sponsors/ufrisk
Thank You 💖