- Регистрация
- 27 Авг 2018
- Сообщения
- 37,817
- Реакции
- 547,054
- Тема Автор Вы автор данного материала? |
- #1
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the Reverse Engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques including BIOS rootkits and computer defense and the exploitation of embedded x86 BIOS are also covered.
This book is primarily oriented toward system programmers and computer security experts. In addition, electronic engineers, pc technicians and computer enthusiasts can also benefit a lot from this book. Furthermore, due to heavy explanation of applied computer architecture (x86 architecture) and compression algorithm, computer science students might also find it useful. However, nothing prevents any people who is curious about BIOS technology to read this book and get benefit from it.
About the Authors
- Darmawan Salihun has published papers on BIOS reverse engineering, BIOS code injection techniques, BIOS hacking, Plug and Play BIOS, and PCI protocol exploitation in the CodeBreakers Journal.
DOWNLOAD: