# BIOS - UEFI Hacking

Feito por: [Getúlio Victor](https://github.com/GetulioVictor)

Diversos recursos a respeito de materiais de segurança para BIOS, UEFI, Rootkits e Bootkits

## Artigos e Recursos

* [Awesome-UEFI-Security](https://github.com/river-li/awesome-uefi-security)
* [UEFI-Lessons](https://github.com/Kostr/UEFI-Lessons)
* [Hardware and Firmware Security Guidance](https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance)
* [BIOS Hacking Challenges](https://github.com/miraliumre/bios)
* [UEFI BIOS Hacking Notes (CH341A Mini USB BIOS Programmer)](https://github.com/kholia/UEFI-BIOS-Hacking-Notes)
* [IMSProg](https://github.com/bigbigmdm/IMSProg/)
* [UEFITool](https://github.com/LongSoft/UEFITool)
* [CH341-USB-EEPROM-Flash-BIOS-Programmer](https://github.com/semaf/CH341-USB-EEPROM-Flash-BIOS-Programmer)
* [Dumping Firmware with CH341A Programmer](https://medium.com/@udayakrishna/dumping-firmware-with-ch341a-programmer-13fba277baa5)
* [UEFI-Bootkit](https://github.com/ajkhoury/UEFI-Bootkit)
* [Rootkits](https://github.com/bootkitsbook/rootkits)
* [UEFI\_RETool](https://github.com/matrosov/UEFI_RETool)
* [CVE-2022-21894](https://github.com/Wack0/CVE-2022-21894)

## Documentos

* [Attacking and Defending BIOS in 2015](https://papers.put.as/papers/firmware/2015/AttackingAndDefendingBIOS-RECon2015.pdf) -[Analyzing UEFI BIOS from Attacker & Defender Viewpoints](https://www.blackhat.com/docs/eu-14/materials/eu-14-Kovah-Analyzing-UEFI-BIOSes-From-Attacker-And-Defender-Viewpoints.pdf)
* [CHIPSEC Platform Security Assessment Framework](https://www.blackhat.com/docs/us-14/materials/arsenal/us-14-Bulygin-CHIPSEC-Slides.pdf)
* [Hacking the Extensible Firmware Interface](https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf)
* [UEFI Firmware Security Concerns and Best Practices](https://uefi.org/sites/default/files/resources/UEFI%20Firmware%20-%20Security%20Concerns%20and%20Best%20Practices.pdf)

## Vídeos

* [UEFI Programming in C (Playlist)](https://youtube.com/playlist?list=PLT7NbkyNWaqZYHNLtOZ1MNxOt8myP5K0p)
* [Breaking Secure Bootloaders](https://youtu.be/XvGcQgx9Jg8)
* [efiXplorer: Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis](https://youtu.be/Sa779TGX3wY)
* [DEF CON 22 - Panel - Summary of Attacks Against BIOS and Secure Boot](https://youtu.be/QDSlWa9xQuA)

## Livros

* Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats por Alex Matrosov, Eugene Rodionov e Sergey Bratus
* UEFI BIOS and Embedded Security por Vincent Zimmer, Jiming Sun e Marc Jones
* The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System por Bill Blunden
* Rootkits: Subverting the Windows Kernel por Greg Hoglund e James Butler
* Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software por Michael Sikorski e Andrew Honig


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://hawksec.gitbook.io/pt/exploitation/hardware-hacking/bios-uefi-hacking.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
