diff options
author | Nicholas Chin <nic.c3.14@gmail.com> | 2023-11-12 20:14:08 -0700 |
---|---|---|
committer | Nicholas Chin <nic.c3.14@gmail.com> | 2023-12-17 19:38:16 -0700 |
commit | f481908135470d55124013bb8770148544979712 (patch) | |
tree | 4f13557136b9149ac75050b763a03e7f31f7a0fc /util | |
parent | 39a3de574a7ae6d6165a660cd7efd9ac6a31a922 (diff) |
README.md: Add references to Open Security Training
The old Open Security Training site had a course called Advanced x86:
BIOS and SMM Internals, which had a set of slides outlining the method
to supress SMIs by changing the GBL_SMI_EN bit. Add a reference to it as
this is where I originally learned of this method.
Diffstat (limited to 'util')
-rw-r--r-- | util/dell-flash-unlock/README.md | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/util/dell-flash-unlock/README.md b/util/dell-flash-unlock/README.md index ba45ddcc..7d9b4b85 100644 --- a/util/dell-flash-unlock/README.md +++ b/util/dell-flash-unlock/README.md @@ -100,3 +100,7 @@ There are other possible protection mechanisms that the firmware can utilize, such as Protected Range Register settings, which apply access permissions to address ranges of the flash, similar to the IFD. However, the E6400 vendor firmware does not utilize these, so they will not be discussed. + +## References +- Open Security Training: Advanced x86: BIOS and SMM Internals - SMI Suppression + - https://opensecuritytraining.info/IntroBIOS_files/Day1_XX_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMI%20Suppression.pdf |