Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate Course.
00:04
In this video, I will be talking about your five muller and in particular with touch about how you if I can be compromised and wise, you find Mallory so dangerous.
00:16
So, uh,
00:17
the way that you can compromise you If I on a PC's through BIOS updates you can do by subjects using the USB flash. So you
00:27
on some pieces, you can do it regularly that way, and this is one of the recommended ways to do by yourself. Date if all the other ways to do the bias of that fail. So
00:40
because the otherwise the rays are to Dubai subject over network so centrally.
00:46
Andi, if your PC is not in an effort that you cannot do it and the 3rd 1 is to do BIOS update from a Wes and PC manufacturers, they create specific packages that allow you to do by a subject from operating system. It's usually a kind of program that you download
01:06
and then you ran it, and this programme may contain the BIOS update within itself, or it can look at your PC. Look at the version of eyes you have what kind of PC is that?
01:15
And then download the appropriate BIOS update from the repository of bias repository on the site of the PC manufacturer. Because by a sub dates and bias flashes,
01:32
you don't do it from third party. You do it on Lee from PC manufacturer. Otherwise, you point the warranty and
01:38
it might work, and it might contain malware.
01:42
So when you do it, we're using USB flash. You can do it before the operating system boots all of the things over network and from OS. They usually have to be done
01:55
when the operating system boots. Although there are some more capabilities in latest generation of, for example, Intel processes. This essentially allow you to do by subject over network before the operating system Boots, for example, of your operating system. Your hard drive is
02:12
still not formatted, and it's the images and uploaded on it. So
02:16
you can do that in theory. And I think that there are now some some utilities that actually allow you to do it.
02:24
Um, so, uh,
02:29
when we talk about bias updates from a West,
02:32
uh, the way that buyers can be compromised is through update drop packages so you,
02:39
for example, there is some kind of,
02:42
as I mentioned before, there is some bug in the firmer of the processor, and you just update the drop package that up. They just did small partial portion off firmer, which then being flushed into. So you change the firmer of the processor
02:59
you can do update off entire bias,
03:02
or you can just add things to it so you can. When you do update a device, it's usually not the entire bias. It's usually something like just
03:13
again drop packages that changed things off the buyers. But you can also do the the Adan Tobias Older two had some functionality to it. It's being done even by the manufacturers of PC's.
03:28
But usually if you have the BIOS package, it contains the entire bias. Why? Because sometimes you have, for example, in in factory or in the
03:38
service departments. You have motherboards that don't have the bias on itself, or they have much older version because motherboards can sit in the in service repair shop like for two years,
03:51
so you don't have the
03:53
the previous version. ABIs. There would be sure you update you have tow push all the thing in.
04:00
But also, if you were talking about Maya's bile smaller, these things can be very small and easily deployable. That can be, you know, less than a megabyte in the insides.
04:10
So if something is happening like this, the question is, why so dangerous? So is it mentioned before these things? They're not detectable by anti virus.
04:19
They are complicated to remove sometimes.
04:24
So even if you detective say okay, I have, ah, buyers that has bean manipulated. Sometimes it can be really complex way to remove it. And you learn about it
04:33
being in a lesson when I start talking about
04:38
the existing known you If I Marber
04:42
and also it can easily spread through networks of the company without to actually anybody knowing that it's spreading in the all the warning signs in terms off antivirus and Tim hours after on PCs and even on the server, they are completely oblivious to it.
04:59
And, of course, as I mentioned, it can do a lot of damage.
05:01
So,
05:02
uh, although dory there are no hundreds or thousands malware for you if I like there is for operating systems and programs on. The reason for that is because it's not so easy to write to you. If I
05:23
malware, um, there they have to be taken seriously just because they're so Stilton Cooper at this point.
05:30
Why is it so difficult? Well, you have to know how the
05:34
the manufacturer off the the PC writes the bias. What are the structures? So basically, you have to reverse engineer the
05:43
machine cold in Okay, so you have five buyers, is not written in machine gold. You can write it in C plus plus, but in order to reverse engineer it, you have to us essentially looking. What's what's in Europe? I virus. And then you have to do the reverse engineering in order to add something
06:00
in a way that it won't fully stop the function. You know, bias of breaking down. So
06:08
it's not so easy to write it. But it's much easier than 15 or 20 years ago when the entire bias was much smaller for sitting in a very small piece off fresh rundown mother board, and it was written and it had to be written directly in the machine called
06:27
OK. In this video, have learned about what the your five Mao for uh, is and how how it can be deployed not actually how it works, but how it's deployed
06:39
and you learned about wise, the dangerous. And in next video, I will continue talking about your five mile were with the example off.
06:50
What, what is happening today?

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor