also wanted to state that yea by default the sys would be UEFI secure boot or csm wit tpm. Thing is if they want that firmware rootkit they could tamper with the bios via a kernel rootkit changed to legacy etc then run whatver they want under under the hood !!
Good info! I have a suggestion.. I think you need to add a "sweet" counter and a "awesome" counter to keep track all the times either sweet or awesome was quietly whispered. See if the record can be beat in the next webinar
This is my favorite webinar yet 😈
also wanted to state that yea by default the sys would be UEFI secure boot or csm wit tpm. Thing is if they want that firmware rootkit they could tamper with the bios via a kernel rootkit changed to legacy etc then run whatver they want under under the hood !!
As a beginner in the field of Malware Analysis, i learnt a lot from this webinar. I also hope such type of webinar in future.
Thank you for sharing !
Welcome!
Good info! I have a suggestion.. I think you need to add a "sweet" counter and a "awesome" counter to keep track all the times either sweet or awesome was quietly whispered. See if the record can be beat in the next webinar
Noted! We will take this fine suggestion under consideration, lol.
I dont know anything about computers what can I do to get rid of rootkits?