-
Notifications
You must be signed in to change notification settings - Fork 112
efiXplorer features
yeggor edited this page Aug 11, 2021
·
7 revisions
Feature name | 32-bit | 64-bit |
---|---|---|
Boot Services | + | + |
Runtime Services | + | + |
SMM services | - | + |
PEI Services | + | - |
Protocols | + | + |
GUIDS | + | + |
Applying types for local variables | + | + |
Vulnerabilities scanner | + | + |
Report in JSON format | + | + |
Loader | - | + |
Dependency graph | - | + |
Annotate Boot Services calls in assembly code automatically:
Annotate Runtime Services calls in assembly code automatically:
Annotate SMM Services calls in assembly code automatically:
Annotate PEI Services calls in assembly code automatically:
Build the list of EFI Protocols firmware consumes and installs:
Build the list of identified EFI GUIDs (including protocol names for known GUIDS):
This feature works only in conjunction with a HexRays decompiler. If you don't have a HexRays decompiler, build efiXplorer
without hexrays_sdk
.
efiXplorer
scans drivers for the following types of vulnerabilities:
- SMM callouts
- OOB Write via wrong
GetVariable
usage (in PEI, DXE and SMM drivers)
At the end of the analysis, a chooser is displayed with the suspected vulnerabilities.
After analysis efiXplorer saves the report in JSON format.