BIOS Disassembly Ninjutsu Uncovered (by Darmawn Mappatutu Salihun) Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques-including BIOS rootkits and computer defense-and the exploitation of embedded x86 BIOS are also covered.
download links:
https://cloud.mail.ru/public/528Z/2NhauREcW
https://app.box.com/s/q0ikr4hxna2j4de5nlvm
https://www.asuswebstorage.com/navigate/s/2925AD0A39BE40B6BD9B59B87875C472Y