<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.7.4">Jekyll</generator><link href="https://preossec.com/https://preossec.com/feed.xml" rel="self" type="application/atom+xml" /><link href="https://preossec.com/https://preossec.com/" rel="alternate" type="text/html" /><updated>2018-10-18T18:42:31+00:00</updated><id>https://preossec.com/https://preossec.com/</id><title type="html">PreOS Security</title><subtitle>Firmware Security For Enterprise And Forensics</subtitle><entry><title type="html">BSidesPDX 2018 Workshop</title><link href="https://preossec.com/https://preossec.com/BSidesPDX-Workshop/" rel="alternate" type="text/html" title="BSidesPDX 2018 Workshop" /><published>2018-10-11T00:00:00+00:00</published><updated>2018-10-11T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/BSidesPDX-Workshop</id><content type="html" xml:base="https://preossec.com/https://preossec.com/BSidesPDX-Workshop/">&lt;p&gt;Lee &amp;amp; Paul will be at BSides PDX 2018 Fri Oct 26th giving a hands-on workshop titled “Detecting Evil Maid Firmware Attacks” &lt;a href=&quot;https://bsidespdx.org/events/2018/workshops.html#Evil%20Maid&quot;&gt;https://bsidespdx.org/events/2018/workshops.html#Evil%20Maid&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Summary:&lt;/p&gt;

&lt;p&gt;Firmware is software that controls the hardware; firmware-based malware (bootkits, firmworms, etc.) has very low-level system access, even while the system is powered off, and is invisible to most security tools. This workshop gives an introduction to platform firmware security, for DFIR professionals responsible for protecting critical infrastructure. Beginning with an introduction to the technologies (UEFI, ACPI, SMM, BMC, Redfish, etc.), the threats, available open source tools, and guidance and best practices, and the latest NIST firmware security lifecycle guidance. The presentation will cover and the lab will use tools like CHIPSEC, UEFITool, UEFIDump, FirmWare Test Suite, ACPIdump, and other open source tools to obtain diagnostic and security information – and ‘blobs’ from the firmware. We will demonstrate how our open source software Firmware Audit (fwaudit) can be used to assist with automation and logging and forensics, and our cloud service for storage and centralized analysis. We’ll be using a Linux VM, participants who want to run workshop labs will need a laptop with VirtualBox installed.&lt;/p&gt;

&lt;p&gt;–&lt;/p&gt;

&lt;p&gt;Immediately after the PreOS workshop, Intel will be presenting their workshop on “UEFI and CHIPSEC development for Security Researchers” &lt;a href=&quot;https://bsidespdx.org/events/2018/workshops.html#Chipsec&quot;&gt;https://bsidespdx.org/events/2018/workshops.html#Chipsec&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Highly recommended!&lt;/p&gt;</content><author><name></name></author><summary type="html">Lee &amp;amp; Paul will be at BSides PDX 2018 Fri Oct 26th giving a hands-on workshop titled “Detecting Evil Maid Firmware Attacks” https://bsidespdx.org/events/2018/workshops.html#Evil%20Maid.</summary></entry><entry><title type="html">Newsletter Q3 2018 - fwaudit releases, e-book, Black Hat, proactive firmware evaluation</title><link href="https://preossec.com/https://preossec.com/Newsletter-Q3-2018/" rel="alternate" type="text/html" title="Newsletter Q3 2018 - fwaudit releases, e-book, Black Hat, proactive firmware evaluation" /><published>2018-08-06T00:00:00+00:00</published><updated>2018-08-06T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/Newsletter-Q3-2018</id><content type="html" xml:base="https://preossec.com/https://preossec.com/Newsletter-Q3-2018/">&lt;h1 id=&quot;fwaudit-updates&quot;&gt;fwaudit updates&lt;/h1&gt;

&lt;p&gt;Our open source firmware security tool released in March at UEFI Plugfest has some updates, now tagged as release 0.0.2. We’ve made some bugfixes, added support for an Intel AMT vulnerability test and cleaned up the code.&lt;/p&gt;

&lt;p&gt;We still consider this code “PRE ALPHA” and we’ll let you know when it is starting to be more useful and have fewer known defects.&lt;/p&gt;

&lt;p&gt;Syslog support under Linux is working in this release, and we think that is an important milestone for enterprise use - assuming you have centralized syslog aggregation in place. Do you? We’d like to know.&lt;/p&gt;

&lt;p&gt;We’d also like to know what are the next most important features to you for a firmware security automation tool.&lt;/p&gt;

&lt;p&gt;We have dedicated email lists for fwaudit, both -announce and -discuss. Sign up here:&lt;/p&gt;

&lt;p&gt;fwaudit-announce:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://lists.preossec.com/mailman/listinfo/fwaudit-announce_lists.preossec.com&quot;&gt;https://lists.preossec.com/mailman/listinfo/fwaudit-announce_lists.preossec.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;fwaudit-discuss:
&lt;a href=&quot;https://lists.preossec.com/mailman/listinfo/fwaudit-discuss_lists.preossec.com&quot;&gt;https://lists.preossec.com/mailman/listinfo/fwaudit-discuss_lists.preossec.com&lt;/a&gt;&lt;/p&gt;

&lt;h1 id=&quot;e-book-released&quot;&gt;E-Book Released&lt;/h1&gt;

&lt;p&gt;After a long wait, we’re proud to announce that the e-book: “Platform Firmware Security Defense for Enterprise System Administrators and Blu Teams” is released.&lt;/p&gt;

&lt;p&gt;We decided to license the book CC BY-NC-SA, so we will publish the source and build files directly on Github (https://github.com/PreOS-Security/) once we’ve tidied them up a bit. Once it is on Github, you’ll be able to submit pull requests. Until then, email editor@preossec.com with feedback.&lt;/p&gt;

&lt;p&gt;If you have trouble with the email attachments, you can download them from an unlinked URL on our corporate site:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://preossec.com/products/ebook-download&quot;&gt;https://preossec.com/products/ebook-download&lt;/a&gt;&lt;/p&gt;

&lt;h1 id=&quot;black-hat-usa-2018&quot;&gt;Black Hat USA 2018&lt;/h1&gt;

&lt;p&gt;Are you going to Black Hat? We’ll be doing a demo of the new release and improvements to our open source firmware security software fwaudit at the Arsenal Tools Demo. We’d love to meet up with you!&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.blackhat.com/us-18/arsenal/schedule/index.html#firmware-audit-platform-firmware-security-automation-for-blue-teams-and-dfir-11359&quot;&gt;https://www.blackhat.com/us-18/arsenal/schedule/index.html#firmware-audit-platform-firmware-security-automation-for-blue-teams-and-dfir-11359&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Contact both of us at:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;mailto:blackhatusa2018@preossec.com&quot;&gt;blackhatusa2018@preossec.com&lt;/a&gt;&lt;/p&gt;

&lt;h1 id=&quot;new-proactive-single-makemodelrevision-firmware-security-evaluation&quot;&gt;New Proactive Single Make/Model/Revision Firmware Security Evaluation&lt;/h1&gt;

&lt;p&gt;We’re both pretty excited to offer a new report. Ship us any single make / model / revision of hardware, we’ll do an in-depth firmware security report. Use this report to inform purchasing decisions, system security positioning, and improve IT procedures such as firmware updates and incident response.&lt;/p&gt;

&lt;p&gt;We will lead by posting example reports to this &lt;a href=&quot;https://firmwaresecurity.com&quot;&gt;https://firmwaresecurity.com&lt;/a&gt;, in sections as (tagged!) blog posts, for:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Lenovo Carbon X1 6th Generation&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Dell XPS 13 9370 (Early 2018)&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once we’re done, you’ll be able to access the full reports as a pdfs on the corporate site:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://preossec.com/services/single-variant-firmware-security-report/&quot;&gt;https://preossec.com/services/single-variant-firmware-security-report/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;$500 USD.&lt;/p&gt;

&lt;p&gt;We will run all publicly available firmware and hardware vulnerability tools and check version numbers, for known issues such as:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Intel AMT&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Intel ME&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;AMD PSP&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Spectre&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Meltdown&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Microcode&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Rowhammer&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We’ll include a comprehensive list of firmware on the system, and highlight potential issues such as:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Closed source binary blobs&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Modifiable firmware&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;How it can be modified (eg: desoldering and flashing chips, JTAG, I2C, etc)&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Compliance with applicable NIST standards&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Tools, updates and support availability from component manufacturer, and OEM&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;We will look for operational support, such as signed firmware updates via Windows update and Linux Vendor Firmware Service (aka: fwupd).&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We will make recommendations if this system should not be used in sensitive areas such as:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Executives (CEO, CTO, etc)&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Finance&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Legal&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Critical Infrastructure&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;DOD&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;PCI&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;HIPAA&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;</content><author><name></name></author><summary type="html">fwaudit updates</summary></entry><entry><title type="html">Black Hat USA 2018 Arsenal Tools Demo of fwaudit</title><link href="https://preossec.com/https://preossec.com/Black-Hat-USA-2018-Arsenal-Tools-Demo/" rel="alternate" type="text/html" title="Black Hat USA 2018 Arsenal Tools Demo of fwaudit" /><published>2018-06-27T00:00:00+00:00</published><updated>2018-06-27T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/Black-Hat-USA-2018-Arsenal-Tools-Demo</id><content type="html" xml:base="https://preossec.com/https://preossec.com/Black-Hat-USA-2018-Arsenal-Tools-Demo/">&lt;p&gt;We’ll be demonstrated a much more powerful and feature complete release of &lt;em&gt;fwaudit&lt;/em&gt; at Black Hat USA in August. We may merge some changes in with the public branch before then - keep an eye on:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://github.com/PreOS-Security/fwaudit&quot;&gt;https://github.com/PreOS-Security/fwaudit&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Our demo is Weds, 2:30pm-3:50pm Station 5:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.blackhat.com/us-18/arsenal/schedule/index.html#firmware-audit-platform-firmware-security-automation-for-blue-teams-and-dfir-11359&quot;&gt;https://www.blackhat.com/us-18/arsenal/schedule/index.html#firmware-audit-platform-firmware-security-automation-for-blue-teams-and-dfir-11359&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This will be our first time at Black Hat, and we’re looking forward to seeing some of the other Arsenal Tools Demos:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.blackhat.com/us-18/arsenal/schedule/index.html&quot;&gt;https://www.blackhat.com/us-18/arsenal/schedule/index.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;and attending some of the Briefings:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.blackhat.com/us-18/briefings/schedule/index.html&quot;&gt;https://www.blackhat.com/us-18/briefings/schedule/index.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If only we could attend everything - but it all happens at once!&lt;/p&gt;

&lt;p&gt;If you’re going to be there, and you’re interested in what we’re up to - we’d love to talk to you. Contact us here: &lt;a href=&quot;mailto:blackhatusa2018@preossec.com&quot;&gt;blackhatusa2018@preossec.com&lt;/a&gt;&lt;/p&gt;</content><author><name></name></author><summary type="html">We’ll be demonstrated a much more powerful and feature complete release of fwaudit at Black Hat USA in August. We may merge some changes in with the public branch before then - keep an eye on:</summary></entry><entry><title type="html">Release of fwaudit and awesome-firmware-security</title><link href="https://preossec.com/https://preossec.com/Release-of-fwaudit-and-awesome-firmware-security/" rel="alternate" type="text/html" title="Release of fwaudit and awesome-firmware-security" /><published>2018-04-20T00:00:00+00:00</published><updated>2018-04-20T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/Release-of-fwaudit-and-awesome-firmware-security</id><content type="html" xml:base="https://preossec.com/https://preossec.com/Release-of-fwaudit-and-awesome-firmware-security/">&lt;p&gt;PreOS Security is happy to announce the very first release of our GPL firmware security tool firmware audit, aka: &lt;em&gt;fwaudit&lt;/em&gt;. You can download it from Github here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://github.com/PreOS-Security/fwaudit&quot;&gt;https://github.com/PreOS-Security/fwaudit&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We’re calling this a 0.0.1 release, as it has many known bugs and issues, and is missing quite a few features you might find useful. We’ll relay the CHIPSEC disclaimer that it is &lt;strong&gt;NOT FOR PRODUCTION USE&lt;/strong&gt;. And in fact, it isn’t suitable for much use at all, yet. Still - check it out if you’re curious, or feeling helpful to us. Give us comments or a pull request!&lt;/p&gt;

&lt;p&gt;We’ve also released a Github awesome list: &lt;a href=&quot;https://github.com/PreOS-Security/awesome-firmware-security&quot;&gt;https://github.com/PreOS-Security/awesome-firmware-security&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Awesome Firmware Security is a curated list compiled from years of Lee’s blogging over at &lt;a href=&quot;https://firmwaresecurity.com&quot;&gt;https://firmwaresecurity.com&lt;/a&gt; and preparation for our many talks and presentations. We’ve already got some feedback from the community via Twitter &lt;a href=&quot;https://twitter.com/PreOS_Security&quot;&gt;https://twitter.com/PreOS_Security&lt;/a&gt; and pull requests. Send us yours! This is a community resource for everyone to use and improve.&lt;/p&gt;</content><author><name></name></author><summary type="html">PreOS Security is happy to announce the very first release of our GPL firmware security tool firmware audit, aka: fwaudit. You can download it from Github here:</summary></entry><entry><title type="html">See You At UEFI Plugfest</title><link href="https://preossec.com/https://preossec.com/See-You-At-UEFI-Plugfest/" rel="alternate" type="text/html" title="See You At UEFI Plugfest" /><published>2018-03-25T00:00:00+00:00</published><updated>2018-03-25T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/See-You-At-UEFI-Plugfest</id><content type="html" xml:base="https://preossec.com/https://preossec.com/See-You-At-UEFI-Plugfest/">&lt;p&gt;What is a UEFI Plugfest? Organized by the UEFI Forum, plugfests are the biannual events at which stakeholders in the UEFI ecosystem can test the interoperability of their UEFI implementations. This includes everyone from manufacturers, independent BIOS vendors and PCIe card manufacturers to operating system vendors - including open source.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.uefi.org/SpringPlugfest2018&quot;&gt;http://www.uefi.org/SpringPlugfest2018&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you are attending the UEFI Plugfest in Bellevue this week, be sure to say “Hi.” PreOS Security are sponsoring the event, and we’d love to talk to you, no matter which part you play in the UEFI ecosystem. We’re also on the test schedule to test out our pre-alpha software.&lt;/p&gt;

&lt;p&gt;Perhaps you’re wondering where we’ve been lately? We’ve been working our our still-upcoming e-book, developing our training modules, writing code, and occasionally having winter cold and/or flu. We’re a bit behind on everything, and haven’t forgotten that many of you are waiting on our e-book and newsletter!&lt;/p&gt;</content><author><name></name></author><summary type="html">What is a UEFI Plugfest? Organized by the UEFI Forum, plugfests are the biannual events at which stakeholders in the UEFI ecosystem can test the interoperability of their UEFI implementations. This includes everyone from manufacturers, independent BIOS vendors and PCIe card manufacturers to operating system vendors - including open source.</summary></entry><entry><title type="html">Hear Our CTO Talk At BSides Seattle</title><link href="https://preossec.com/https://preossec.com/Hear-Our-CTO-Talk-At-BSides-Seattle/" rel="alternate" type="text/html" title="Hear Our CTO Talk At BSides Seattle" /><published>2018-01-25T00:00:00+00:00</published><updated>2018-01-25T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/Hear-Our-CTO-Talk-At-BSides-Seattle</id><content type="html" xml:base="https://preossec.com/https://preossec.com/Hear-Our-CTO-Talk-At-BSides-Seattle/">&lt;p&gt;Lee Fisher, our CTO will be speaking at BSides Seattle, which actually takes place in Redmond on the Microsoft campus. Tickets are all sold out, but you can join the waitlist to see if tickets become available.&lt;/p&gt;

&lt;p&gt;Waitlist here: &lt;a href=&quot;https://www.eventbrite.com/e/bsides-seattle-2018-tickets-40951270352&quot;&gt; https://www.eventbrite.com/e/bsides-seattle-2018-tickets-40951270352 &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;BSides Seattle Webpage: &lt;a href=&quot;http://www.securitybsides.com/w/page/121128486/BsidesSeattle2018&quot;&gt; http://www.securitybsides.com/w/page/121128486/BsidesSeattle2018 &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The title of the talk is “Platform Firmware for Blue Teams: Detecting Evil Maid Attacks” and you’ll note that CEO Paul English is also credit as speaking, but his attendance isn’t guaranteed due to travel.&lt;/p&gt;</content><author><name></name></author><summary type="html">Lee Fisher, our CTO will be speaking at BSides Seattle, which actually takes place in Redmond on the Microsoft campus. Tickets are all sold out, but you can join the waitlist to see if tickets become available.</summary></entry><entry><title type="html">PreOS Security on the Brakeing Security Podcast</title><link href="https://preossec.com/https://preossec.com/Brakeing-Security-Podcast/" rel="alternate" type="text/html" title="PreOS Security on the Brakeing Security Podcast" /><published>2017-10-23T00:00:00+00:00</published><updated>2017-10-23T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/Brakeing-Security-Podcast</id><content type="html" xml:base="https://preossec.com/https://preossec.com/Brakeing-Security-Podcast/">&lt;p&gt;Brakeing Security has posted the podcast with our interview: &lt;a href=&quot;http://brakeingsecurity.com/2017-special004-source-conference-seattle-2017&quot;&gt;http://brakeingsecurity.com/2017-special004-source-conference-seattle-2017&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks Brian!&lt;/p&gt;</content><author><name></name></author><summary type="html">Brakeing Security has posted the podcast with our interview: http://brakeingsecurity.com/2017-special004-source-conference-seattle-2017</summary></entry><entry><title type="html">SOURCE Seattle 2017</title><link href="https://preossec.com/https://preossec.com/SOURCE-Seattle-2017/" rel="alternate" type="text/html" title="SOURCE Seattle 2017" /><published>2017-10-12T00:00:00+00:00</published><updated>2017-10-12T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/SOURCE-Seattle-2017</id><content type="html" xml:base="https://preossec.com/https://preossec.com/SOURCE-Seattle-2017/">&lt;p&gt;PreOS attended and spoke at SOURCE Seattle 2017 in Bellevue, October 5th &amp;amp; 6th. Lee presented a one-hour summary talk version of our half-day hands-on tutorial on firmware security. Slides are available: &lt;a href=&quot;https://firmwaresecurity.files.wordpress.com/2017/10/srcsea17.pdf&quot;&gt;https://firmwaresecurity.files.wordpress.com/2017/10/srcsea17.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Lee’s personal blog mentions this talk also: &lt;a href=&quot;https://firmwaresecurity.com/2017/10/10/uefi-slides-from-source-seattle-uploaded/&quot;&gt;https://firmwaresecurity.com/2017/10/10/uefi-slides-from-source-seattle-uploaded/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At the conference, Bryan of the Brakeing Security podcast interviewed PreOS Security co-founder Paul English and Lee Fisher, along with some other SOURCE Seattle speakers. The podcast should be released some time this week.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.brakeingsecurity.com/&quot;&gt;http://www.brakeingsecurity.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://brakeingsecurity.com/rss&quot;&gt;http://brakeingsecurity.com/rss&lt;/a&gt;&lt;/p&gt;</content><author><name></name></author><summary type="html">PreOS attended and spoke at SOURCE Seattle 2017 in Bellevue, October 5th &amp;amp; 6th. Lee presented a one-hour summary talk version of our half-day hands-on tutorial on firmware security. Slides are available: https://firmwaresecurity.files.wordpress.com/2017/10/srcsea17.pdf</summary></entry><entry><title type="html">SeaGL 2017</title><link href="https://preossec.com/https://preossec.com/SeaGL-2017/" rel="alternate" type="text/html" title="SeaGL 2017" /><published>2017-10-11T00:00:00+00:00</published><updated>2017-10-11T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/SeaGL-2017</id><content type="html" xml:base="https://preossec.com/https://preossec.com/SeaGL-2017/">&lt;p&gt;PreOS attended and spoke at SeaGL 2017 in Seattle October 6th &amp;amp; 7th. Paul presented a version of Lee’s talk at SOURCE Seattle (blog post upcoming) titled “Detecting BadBIOS, Evil Maids, Bootkits, and Other Firmware Malware” &lt;a href=&quot;https://osem.seagl.org/conferences/seagl2017/program/proposals/374&quot;&gt;https://osem.seagl.org/conferences/seagl2017/program/proposals/374&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Per the organizers’ suggestion, slides were uploaded to archive.org:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://archive.org/details/seagl-2017&quot;&gt;https://archive.org/details/seagl-2017&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This talk was slightly more aimed at individuals than people managing large fleets of machines, but can (and will!) be tuned even more for future events. Perhaps LinuxFest Northwest?&lt;/p&gt;

&lt;p&gt;Meanwhile, we’re still working hard on our “&lt;em&gt;Firmware Security For Sysadmins and Blue Teams&lt;/em&gt;” e-book, which should condense both talk and tutorial guidance for large fleets of machines into the most compact format we can manage. Firmware security is a deep topic!&lt;/p&gt;

&lt;p&gt;You can still get a free copy of our e-book when it comes out by signing up for our Quarterly Firmware Newsletter (okay, technically you can just request a copy of the e-book if you like):&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://preossec.com/newsletter&quot;&gt;https://preossec.com/newsletter&lt;/a&gt;&lt;/p&gt;</content><author><name></name></author><summary type="html">PreOS attended and spoke at SeaGL 2017 in Seattle October 6th &amp;amp; 7th. Paul presented a version of Lee’s talk at SOURCE Seattle (blog post upcoming) titled “Detecting BadBIOS, Evil Maids, Bootkits, and Other Firmware Malware” https://osem.seagl.org/conferences/seagl2017/program/proposals/374.</summary></entry><entry><title type="html">Background on CVE-2017-5689/VU-491375/INTEL-SA-00075 (Intel AMT)</title><link href="https://preossec.com/https://preossec.com/Intel-AMT-CVE/" rel="alternate" type="text/html" title="Background on CVE-2017-5689/VU-491375/INTEL-SA-00075 (Intel AMT)" /><published>2017-06-17T00:00:00+00:00</published><updated>2017-06-17T00:00:00+00:00</updated><id>https://preossec.com/https://preossec.com/Intel-AMT-CVE</id><content type="html" xml:base="https://preossec.com/https://preossec.com/Intel-AMT-CVE/">&lt;p&gt;&amp;lt;Note: We’re going to try and post a blog entry for major firmware
vulnerabilities that impact enterprises, and the recent Intel AMT
vulnerability seems like a good place to start.&amp;gt;&lt;/p&gt;

&lt;p&gt;Technology Overview:&lt;/p&gt;

&lt;p&gt;Quoting Wikipedia, “Intel Active Management Technology (AMT) is hardware
and firmware technology for remote out-of-band management of personal
computers, in order to monitor, maintain, update, upgrade, and repair
them.&amp;lt;1&amp;gt; Out-of-band (OOB) or hardware-based management is different
from software-based (or in-band) management and software management agents.”&lt;/p&gt;

&lt;p&gt;Intel AMT is a firmware technology that runs on the Intel ME processor.
AMT is normally enabled on servers, but some ‘business-class’
desktops/laptops – such as Thinkpads – also use AMT.&lt;/p&gt;

&lt;p&gt;AMT is active even when the operating system is powered off, and the
power switch is off, if there is power supply AMT can be running.&lt;/p&gt;

&lt;p&gt;AMT can be remotely administrated. If there is a network connection, AMT
may be sending network traffic. Normally AMT is considered an
ethernet-centric technology, but it appears there are scenerios that AMT
also uses WiFi.&lt;/p&gt;

&lt;p&gt;Intel ME processor cannot be disabled with tools from Intel. Intel AMT
may be disabled in the boot menu.&lt;/p&gt;

&lt;p&gt;Vulnerability Background:&lt;/p&gt;

&lt;p&gt;Maksim Malyutin of Embedi located the vulnerability.&lt;/p&gt;

&lt;p&gt;Tenable also ‘rediscovered’ the vulnerability, both Embedi and Tenable
have good technical descriptions of the vulnerability.&lt;/p&gt;

&lt;p&gt;The AMT code has a string copy function to check the remote user’s
password, and they don’t check the return code, so &lt;em&gt;ANY&lt;/em&gt; password will
work for &lt;em&gt;ANY&lt;/em&gt; user.&lt;/p&gt;

&lt;p&gt;Mitigations:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Read list of mitigations from Intel and US-CERT.&lt;/li&gt;
  &lt;li&gt;Get latest AMT software update from Intel/vendor.&lt;/li&gt;
  &lt;li&gt;Check Intel announcement for tools to detect and disable.&lt;/li&gt;
  &lt;li&gt;Disable AMT.&lt;/li&gt;
  &lt;li&gt;If using AMT, question the need to use it.&lt;/li&gt;
  &lt;li&gt;Disable AMT in network environments where you cannot fully control the
network traffic (eg, mobile AMT-enabled laptop at external wifi hotspot)&lt;/li&gt;
  &lt;li&gt;Consider some non-Intel community tools to check AMT and ME status.&lt;/li&gt;
  &lt;li&gt;Isolate any AMT network traffic from public Internet (possible with
Ethernet, perhaps not possible with WiFi-enabled business-laptops when
roaming (eg, coffee shop).&lt;/li&gt;
  &lt;li&gt;Set corporate policy regarding AMT use (update policy, disable/enable
status).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Beyond the Intel tool, some &lt;em&gt;untested&lt;/em&gt; community tools that might be
helpful. Beyond detecting current status/informatoin, some of these
community tools have features to attempt to disable AMT and/or ME, which
may or may not work. Ask your vendor and local hardware expert before
touching any of the non-readonly features, they may brick your system if
you are not very careful.&lt;/p&gt;

&lt;p&gt;Intel AMT aside, if your enterprise uses IPMI, or DMTF SMASH, DMTF DASH,
DMTF Redfish, HP iLO, Dell DRAC, IBM Remote Supervisor Adapter, AMI
MegaRac, or similar network-enabled OOB pre-OS technologies, you should
also check for latest software, and ensure that their network traffic is
isolated from attackers.&lt;/p&gt;

&lt;p&gt;More Information:&lt;/p&gt;

&lt;p&gt;technology background:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html&quot;&gt;http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Intel_Active_Management_Technology&quot;&gt;https://en.wikipedia.org/wiki/Intel_Active_Management_Technology&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Information from the security researcher who discovered the vulnerability:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://www.embedi.com/news/mythbusters-cve-2017-5689&quot;&gt;https://www.embedi.com/news/mythbusters-cve-2017-5689&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf&quot;&gt;https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Information from Intel, including tools:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://newsroom.intel.com/news/important-security-information-intel-manageability-firmware/&quot;&gt;https://newsroom.intel.com/news/important-security-information-intel-manageability-firmware/&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&amp;amp;languageid=en-fr&quot;&gt;https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&amp;amp;languageid=en-fr&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://downloadcenter.intel.com/download/26754&quot;&gt;https://downloadcenter.intel.com/download/26754&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://downloadcenter.intel.com/download/26755&quot;&gt;https://downloadcenter.intel.com/download/26755&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Subset of community tools:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://github.com/mjg59/mei-amt-check&quot;&gt;https://github.com/mjg59/mei-amt-check&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://sourceforge.net/p/openamt/wiki/Home/&quot;&gt;https://sourceforge.net/p/openamt/wiki/Home/&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://svn.nmap.org/nmap/scripts/http-vuln-cve2017-5689.nse&quot;&gt;https://svn.nmap.org/nmap/scripts/http-vuln-cve2017-5689.nse&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://github.com/bartblaze/Disable-Intel-AMT&quot;&gt;https://github.com/bartblaze/Disable-Intel-AMT&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://github.com/CerberusSecurity/CVE-2017-5689&quot;&gt;https://github.com/CerberusSecurity/CVE-2017-5689&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://github.com/travisbgreen/intel_amt_honeypot&quot;&gt;https://github.com/travisbgreen/intel_amt_honeypot&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://github.com/platomav/MEAnalyzer&quot;&gt;https://github.com/platomav/MEAnalyzer&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://github.com/skochinsky/me-tools&quot;&gt;https://github.com/skochinsky/me-tools&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://github.com/corna/me_cleaner&quot;&gt;https://github.com/corna/me_cleaner&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Selected subset of other sources of information:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/&quot;&gt;https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;http://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability&quot;&gt;http://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;http://mjg59.dreamwidth.org/48837.html&quot;&gt;http://mjg59.dreamwidth.org/48837.html&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://www.ssh.com/vulnerability/intel-amt/&quot;&gt;https://www.ssh.com/vulnerability/intel-amt/&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://www.kb.cert.org/vuls/id/491375&quot;&gt;https://www.kb.cert.org/vuls/id/491375&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://www.us-cert.gov/ncas/current-activity/2017/05/07/Intel-Firmware-Vulnerability&quot;&gt;https://www.us-cert.gov/ncas/current-activity/2017/05/07/Intel-Firmware-Vulnerability&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://vuldb.com/?id.100794&quot;&gt;https://vuldb.com/?id.100794&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;https://isc.sans.edu/forums/diary/Do+you+have+Intel+AMT+Then+you+have+a+problem+today+Intel+Active+Management+Technology+INTELSA00075/22364/&quot;&gt;https://isc.sans.edu/forums/diary/Do+you+have+Intel+AMT+Then+you+have+a+problem+today+Intel+Active+Management+Technology+INTELSA00075/22364/&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;</content><author><name></name></author><summary type="html">&amp;lt;Note: We’re going to try and post a blog entry for major firmware vulnerabilities that impact enterprises, and the recent Intel AMT vulnerability seems like a good place to start.&amp;gt;</summary></entry></feed>