Go HERE to take this class as a 4-Day Buffet course.
Go HERE to take this class as a 3-Day Buffet course.
Go HERE to join just the x86-64 assembly class.
Go HERE to join just the x86-64 OS internals class.
Because we give you all the lecture and lab materials and videos after class, what you’re really paying for is support from the instructor! So you’ll be entitled to keep asking up to 20 questions after class, with 1-2 hour turnaround answers (after accounting for time-zone differences.) This lets you keep productively working through the material if you run out of time at the conference. If you’d like to learn more about the benefits of this style of class delivery, please read this blog post.
SO much visualization; there is zero “wall of texts” slides.
I loved the threat trees and explanations that went along with them, the more narrative approach made it easy to stay engaged.
I like that it’s progressive and well taught with lots of tricks to make the material less dry
Really enjoyed the mix of lecture with some practical investigation on hardware with Chipsec.
The animated diagrams and humor mixed in with the slides worked really well for communicating how memory and registers were arranged and how bytes and nibbles split into different fields.
The “go forth and read things you will now understand better” research unlocked sections were great motivation for learning new things and letting me dive into rabbit holes of neat information.
The explanation of how the manuals are organized and how to find information in them along with the little fact lookup missions are so valuable, especially with Intel manuals.
I really enjoyed this class and the material. I will be referring to it frequently I am sure. I am also thankful for the collection of data sheets in the gitlab repo. That is a nice touch and I’m sure it took a long time to collect and organize.
System Management Mode (SMM)
Xeno began leading Windows kernel-mode rootkit detection and defense research projects at MITRE in 2009, before moving into research on BIOS security in 2011. His team’s first public talks started appearing in 2013, which led to a flurry of presentations on BIOS-level vulnerabilities up through 2014. In 2015 he co-founded LegbaCore.
And after presenting a firmware worm that could spread between Macs via Apple’s EFI-based BIOS and Thunderbolt Ethernet adapters, he ended up working for Apple. There he worked on securing all the lesser-known firmwares on Macs and peripherals – everything from 3rd party GPUs to SecureBoot for monitors! He also worked on the x86-side of the T2 SecureBoot architecture, and his final project was leading the M1 SecureBoot architecture – being directly responsible for designing a system that could provide iOS-level security, while still allowing customer choice to trust arbitrary non-Apple code such as Linux bootloaders. He left Apple in Dec 2020 after the M1 Macs shipped, so he could work full time on OpenSecurityTraining2