F
Size: a a a
F
T
T
T
F
T
T
T
T
F
T
Okay, but: Exploiting this vulnerability requires root / admin access to access the grub.cfg file located in the EFI System Partition, which means the attacker must first gain a foothold on the system and escalate privileges (physical access also works). The vuln only helps with persistence across system reboots, so it’s unnecessary — and perilously noisy — for attackers to employ this if they already have root on a system that never reboots. It’s also preposterously unlikely that any attacker will spontaneously write on-the-fly real mode shellcode that will perform boot injection and OS loading. If they do, they probably deserve the win.Теперь на счет загрузки по сети. В соответствии с текстом тут
GRUB provides two second stage images, `nbgrub' and `pxegrub' (see section GRUB image files). Those images are the same as the normal Stage 2, except that they set up a network automatically, and try to load a configuration file from the network, if specified.Во-первых, судя по всему да, фишка только в обходе логов/защиты и persistence, но это не так уж и мало на самом деле.
F
Okay, but: Exploiting this vulnerability requires root / admin access to access the grub.cfg file located in the EFI System Partition, which means the attacker must first gain a foothold on the system and escalate privileges (physical access also works). The vuln only helps with persistence across system reboots, so it’s unnecessary — and perilously noisy — for attackers to employ this if they already have root on a system that never reboots. It’s also preposterously unlikely that any attacker will spontaneously write on-the-fly real mode shellcode that will perform boot injection and OS loading. If they do, they probably deserve the win.Теперь на счет загрузки по сети. В соответствии с текстом тут
GRUB provides two second stage images, `nbgrub' and `pxegrub' (see section GRUB image files). Those images are the same as the normal Stage 2, except that they set up a network automatically, and try to load a configuration file from the network, if specified.Во-первых, судя по всему да, фишка только в обходе логов/защиты и persistence, но это не так уж и мало на самом деле.
q
NT
И
T
И
T
T