What happens if there's a vulnerablility in your motherboard? Today we dive deep on a UEFI vulnerability that allows for a user to run code at... Ring -2.
Article: https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/
π« COURSES π« Learn to code in C at https://lowlevel.academy
π° NEWSLETTER π° Sign up for our newsletter at https://mailchi.mp/lowlevel/the-low-down
π GREAT BOOKS FOR THE LOWEST LEVELπ
Blue Fox: Arm Assembly Internals and Reverse Engineering: https://amzn.to/4394t87
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation : https://amzn.to/3C1z4sk
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software : https://amzn.to/3C1daFy
The Ghidra Book: The Definitive Guide: https://amzn.to/3WC2Vkg
π₯π₯π₯ SOCIALS π₯π₯π₯
Low Level Merch!: https://lowlevel.store/
Follow me on Twitter: https://twitter.com/LowLevelTweets
Follow me on Twitch: https://twitch.tv/lowlevellearning
Join me on Discord!: https://discord.gg/gZhRXDdBYY