Recon Brussels 2018 - Hacking Toshiba Laptops |
|
We’d like to present a story about hacking a 14 years old Toshiba laptop in order to create a keygen for their BIOS password recovery mechanism. As an unexpected bonus we’ve obtained the EC firmware signing keys. This allows us to plant a stealth and persistent rootkit on the laptop. We will also have a look about how this relates to their newest laptop models.
Michał ‘Redford’ Kowalczyk: Vice-captain of the Dragon Sector CTF team. Passionate about reverse engineering for over 10 years. Loves reversing random stuff, especially if it contains broken crypto or interesting obfuscation. Currently he spends most of his time as a researcher at Invisible Things Lab and on developing the open source reverse-engineering tool ‘Veles’. Serge ‘q3k’ Bazanski: Systems engineer by day, hacker of all trades by night. His current set of interests includes distributed systems, digital logic, software defined networking, side channel attacks on hardware and metal machining. Cofounder of the Warsaw Hackerspace and member of the Dragon Sector CTF team. Connoisseur of unusual liquors, obscure computer architectures and mediocre puns. |