(no title)
adrians1 | 2 years ago
I don't get the point of this. Any vulnerability that requires local access can be exploited if you first get remote code execution through another vulnerability. Also, exploiting the browser or the media player doesn't give you admin privileges, you need another privilege escalation exploit for that.
tuetuopay|2 years ago
- the persistence that’s nearly perfect
- an av cannot detect it ever
- it bypasses all forms of secure boot by getting code exec at the earliest of stages in the boot chain of trust
- the disassemblies show that the bios vendors did not even remotely try to make the parser secure. it is a joke. and if an image parser is that bad, I can’t even imagine the quality of usb or network stacks
K0balt|2 years ago
adrians1|2 years ago