- Joined
- Mar 30, 2020
airgap yourself on a windows 95 tower
done
done
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Finally, a small turd of wisdom floating in the toilet that is this thread.airgap yourself on a windows 95 tower
done
i hate to be a buzzkill but boot attacks are most useful for when you dont want the victim to know they've been compromisedall this stuff about bootloaders can be circumvented with rubber hose cryptography.
And I've talked about the whole chain in the post above yours.Yes, and kernel driver signing cannot be trusted without full boot chain of trust.
If someone compromises the bootloader, they have compromised the kernel.
If they have compromised the kernel, they have compromised driver verification.
dudeI've talked about the whole chain
I disagree with this. Today, even when you have physical access to a device, persistence is often hard to achieve. That's why, with a lot of console hacks/iOS JB's, you have to reapply it on boot each time. Achieving persistence is always a goal. Sometimes it takes years to get there, or it just never happens at all, and you wind up with a tethered jailbreak or whatever.Persistence after a simple reboot once the whole system is already compromised was never a hard problem for an attacker
what in the liveing fucking shit are you fucking talking about ou fucking cuntI disagree with this. Today, even when you have physical access to a device, persistence is often hard to achieve. That's why, with a lot of console hacks/iOS JB's, you have to reapply it on boot each time. Achieving persistence is always a goal. Sometimes it takes years to get there, or it just never happens at all, and you wind up with a tethered jailbreak or whatever.
Yes, that is true for a totally locked system like an Apple iPhone or a console where even the owner needs Apple's permission to run any bit of code. And I do believe that this is Microsoft's end goal but even Windows 11 is not at that level yet.I disagree with this. Today, even when you have physical access to a device, persistence is often hard to achieve. That's why, with a lot of console hacks/iOS JB's, you have to reapply it on boot each time. Achieving persistence is always a goal. Sometimes it takes years to get there, or it just never happens at all, and you wind up with a tethered jailbreak or whatever.
Semper-Fi noble re.tard, I salute your dedication to the cause.what in the liveing fucking shit are you fucking talking about ou fucking cunt
do you understtand what's at stake here????!?!?????!??!
FUCKING SHIT, WAKE THE FUCK UP!!!!
mate that is a fucking awesomep postSemper-Fi noble exceptional individual, I salute your dedication to the cause.
Without a full chain of trust, you can't protect against this threatIt's still wrong to say that Secure Boot stopped drivers being a common target to infect.
Again, wrong. The point of secure boot is to help establish a chain of trust. Part of that chain is an uncompromised boot process. Microsoft's own documentation counters what you've said. But also now it's kinda clear you have a poor understanding of computer security and defense in depth.Not to avoid kernel drivers getting infected.
Without completely airgapping your computer in a safe deep in the ocean you can't protect against this threat.Without a full chain of trust, you can't protect against this threat
Saying "Secure Boot defends against kernel driver infection" is like saying a locked window protects against someone breaking in through your door because when the window isn't locked you can enter through it and then open the door from the inside.Again, wrong. The point of secure boot is to help establish a chain of trust. Part of that chain is an uncompromised boot process. Microsoft's own documentation counters what you've said. But also now it's kinda clear you have a poor understanding of computer security and defense in depth.
Wouldn't that be "watergapping"?Without completely airgapping your computer in a safe deep in the ocean you can't protect against this threat.
There's still air in the safe,Wouldn't that be "watergapping"?
Schroedinger called, you can have your cat back...There's still air in the safe,
Checkmate, atheists.
Useless whataboutism. Nothing is perfect. More controls and depth raises the difficult for attackers and the effectiveness of the security model. But the baseline protection of this threat is ensuring that no untrusted code is run in kernelspace under normal operation. Any broken link from start to userspace execution violates this.Without completely airgapping your computer in a safe deep in the ocean you can't protect against this threat.
Lmao wrongSaying "Secure Boot defends against kernel driver infection" is like saying a locked window protects against someone breaking in through your door because when the window isn't locked you can enter through it and then open the door from the inside.
It's just stupid.
Lmao wrongAnd additionally you tried to paint Secure Boot as a proven deterrent for kernel driver infection even though that is not true at all.
this betrays a fundamental misunderstanding of the place the TPM has in the Windows/eUFI security model. Also saying that "far fewer" people use Secure boot than they do kernel driver signing is unambiguously wrong.Far fewer people use the whole chain of trust with TPM and Secure Boot and everything than people using just kernel driver signing which almost every Windows user has used since Vista.
fundamental misunderstanding of the place the TPM has in the Windows/eUFI security model. It's not really used for cryptographic operations except when those operations are using protected key material. Such as: BitLocker keys or protected applications such as DRM (applying a KEK to yield a DEK (in the tpm) and then send that DEK to kernelspace for further decryption).Oh and Microsoft's own documentation says TPM isn't required for Secure Boot. There goes your chain of trust.