Hasty Briefsbeta

Exploiting signed bootloaders to circumvent UEFI Secure Boot

8 hours ago
  • #UEFI
  • #Secure Boot
  • #Bootloader
  • Modern PC motherboards follow UEFI specification since 2010.
  • Secure Boot, introduced in 2013, prevents execution of unsigned or untrusted program code.
  • Secure Boot can be disabled, but requires physical presence of the user.
  • Most motherboards trust only Microsoft keys, forcing vendors to sign bootloaders with Microsoft.
  • Linux distributions and other software must sign bootloaders with Microsoft to work with Secure Boot.
  • PreLoader and shim are solutions to run untrusted code with Secure Boot enabled.
  • Super UEFIinSecureBoot Disk allows booting any OS or .efi file without disabling Secure Boot.
  • Silent UEFIinSecureBoot Disk uses signed Kaspersky bootloader to silently boot untrusted .efi files.
  • ZeroNet is a decentralized web system used to distribute Silent UEFIinSecureBoot Disk.