BIOS rootkits- reality or fiction?

Discussion in 'other security issues & news' started by aigle, Oct 23, 2007.

Thread Status:
Not open for further replies.
  1. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    I don't see how :doubt: o_O
    If you install from trusted repositories, things should be OK. But yes, with a moron (sorry for the word) between the chair and the keyboard, you can expect everything. I can imagine a moron writing his root password to install ecard.rpm :rolleyes:
    Linux firewall
    Linux hardening
    Linux HIPS/sandbox
    Linux integrity checker
    Linux rootkit scanner
     
  2. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    I am not a programmer. I just guess that if u know the code. It might be easy to break through it.
    I have already too many links to read so can,t say anything about the ones u posted.:)

    Expect anything from ordinary users.

    Just to end the discussion that sofar the solution for BIOS rootkits is not a linux BIOS but a hardware jumper, IMO ofcourse.
     
  3. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    And if you know the code, you can catch dodgy bytes.
    How are you going to protect the firmware of other devices (VGAs, optical devices, PCI cards, RAID controllers)?
    Flashing DVD burners with new/third-party firmwares is a somewhat common practice.
     
  4. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    A two way game- easier to explot, easier to protect.Not sure who will have an edge.
    If I know I would have told you.:D
     
  5. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    Lol.:D

    Agree totally.

    Lol, cat and mouse, I am a programmer but I could not tell you what is better. Probably I would tend to closed source for sensitive areas.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.