A-List, LLC, 2006. — 498 p.
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques — including BIOS rootkits and computer defense — and the exploitation of embedded x86 BIOS are also covered.
The Basic
Motherboard BIOS Reverse Engineering
Expansion ROM
BIOS Ninjutsu
Other Applications of BIOS Technology
In this book, the courier font is used to indicate that text is one of the following:
Source code
Numeric values
Configuration file entries
Directory/paths in the file system
Datasheet snippets
CPU registers
Hexadecimal values are indicated by prefixing them with a 0x or by appending them with h. For
example, the integer value 4691 will, in hexadecimal, look like 0x1253 or 1253h. Hexadecimal values
larger than four digits will be accompanied by underscore every four consecutive hexadecimal digits to
ease reading the value, as in 0xFFFF_0000 and 0xFD_FF00_0000.
Binary values are indicated by appending them with b. For example, the integer value 5 will, in binary,
look like 101b.
Words will appear in the italic font, in this book, for following reasons:
When defining a new term
For emphasis
Words will appear in the bold font, in this book, for the following reasons:
When describing a menu within an application software in Windows
A key press, e.g. CAPSLOCK, G, Shift, C, etc.
For emphasis