Exploiting signed bootloaders to circumvent UEFI Secure Boot
8 hours ago
- #UEFI
- #Secure Boot
- #Bootloader
- Modern PC motherboards follow UEFI specification since 2010.
- Secure Boot, introduced in 2013, prevents execution of unsigned or untrusted program code.
- Secure Boot can be disabled, but requires physical presence of the user.
- Most motherboards trust only Microsoft keys, forcing vendors to sign bootloaders with Microsoft.
- Linux distributions and other software must sign bootloaders with Microsoft to work with Secure Boot.
- PreLoader and shim are solutions to run untrusted code with Secure Boot enabled.
- Super UEFIinSecureBoot Disk allows booting any OS or .efi file without disabling Secure Boot.
- Silent UEFIinSecureBoot Disk uses signed Kaspersky bootloader to silently boot untrusted .efi files.
- ZeroNet is a decentralized web system used to distribute Silent UEFIinSecureBoot Disk.