"Booting" is the process of starting up a computer from the OFF state. This tag is for attacks and security measures relating to the startup routine of computer hardware, firmware, or operating systems.
Questions tagged [boot]
96 questions
2
votes
2 answers
Can malware migrate between OSes on the same machine?
Someone here at work just made an interesting claim; they stated that it's possible for malware, launched in e.g. Windows, to remain in RAM through a reboot and continue working in Linux on the machine when it boots.
Are they right? I'm almost…
![](../../users/profiles/123604.webp)
tink
- 196
- 9
2
votes
1 answer
using secure boot in embedded systems
The whole idea about using Secure Boot in Embedded Systems to boot an operating system is new to me. I've never paid much attention to it previously. I just know that it prevents the loading at start-up of code which has bad credentials which could…
![](../../users/profiles/186490.webp)
Engineer999
- 257
- 1
- 8
2
votes
1 answer
Can malware have its own GRUB/boot-loader and use it to be active?
I use Ubuntu 16.04. After I mounted an ISO which may or may not have had malware in it, my system sometimes ends up showing a blank screen after logging into Ubuntu or reboots a minute or two after I log into Ubuntu or like today, when it reached…
![](../../users/profiles/717.webp)
Nav
- 351
- 2
- 9
2
votes
1 answer
System encryption on a uefi system?
I was thinking about encrypting my ssd(just out of curiosity, mostly) and was wondering the possible security threats an unencrypted /boot partition can pose(if any).
I know that I can encrypt the root and home partition without any problem. Also, I…
![](../../users/profiles/155131.webp)
twkmz
- 123
- 3
2
votes
4 answers
Is there such thing as a password enforced write protected flash drive?
We would like to provide a flash drive to a client, that they can boot to, which includes a read-only operating system of our own customization, probably Linux. Every boot, it starts from clean slate.
With the current setup, a person with physical…
![](../../users/profiles/764.webp)
700 Software
- 13,807
- 3
- 52
- 82
2
votes
0 answers
How is hardware based chain of trust implemented in practice for secure boot?
To do secure boot we need an immutable public key baked into the ROM. This key is used to sign the boot loader or the key used to sign the boot loader. I have these questions -
Which code does this signature check? Is this code in the ROM?
How is…
![](../../users/profiles/6937.webp)
user220201
- 893
- 9
- 22
2
votes
1 answer
Could a computer turn itself on if the BIOS was modified even if it was turned off by holding the power button down?
My Thinkpad might have been hacked and I know this sounds a little far-fetched, but I suspect the BIOS might have also been hacked.
Would turning it off by holding the power button for a few seconds ensure that it could not turn itself back on…
![](../../users/profiles/117279.webp)
user117279
- 105
- 5
2
votes
4 answers
Is a computer more vulnerable if wireless is left on when booting?
Normally I switch off wireless on my laptop before I shut it down but I forgot to do this last night. So this morning, after I booted up the laptop, I saw the wireless notification on the bottom right was active long before the antivirus and…
![](../../users/profiles/84426.webp)
Joseph
- 137
- 6
2
votes
1 answer
How to find out if my MBR has Evil Maid code?
If Truecrypt Bootloader will remain visually the same, how can I find out if it was infected?
![](../../users/profiles/114290.webp)
Fairlight
- 23
- 2
2
votes
1 answer
Android Rooting and Evil Maid Attacks
I'm trying to learn more about full disk encryption (in the context of a Linux based server) and what schemes offer true security and which only offer the illusion of security.
As I understand it, most (all?) software based full disk encryption…
![](../../users/profiles/37100.webp)
Dominic P
- 365
- 1
- 10
2
votes
1 answer
tpm sealing and secure boot
I have worked with TPM for a while, and I'm interested in some of its features. Especially sealing and the use of TPM's PCRs in the secure boot process.
My question is: What is stopping an attacker from disabling the TPM until after boot? Then…
![](../../users/profiles/93901.webp)
amir dachbash
- 63
- 4
1
vote
2 answers
Laptop tampering and boot loader
I try to find out how far I can secure my laptop from physical access and tampering attempts.
Setup: ThinkPad with Linux installation
What I have done so far:
disk encryption using cryptsetup for everything except /boot
entering UEFI setup menu is…
![](../../users/profiles/38361.webp)
firefexx
- 189
- 6
1
vote
2 answers
Moving /boot to USB and Preventing booting from other USB devices (Allow boot from only one USB)
I'm going to move my /boot/ folder to a USB to as a security measure to protect against Full Disk Encryption exploits. My question is, is it possible to only allow boot from USB from a single USB device and not any USB that is plugged in?
Thanks…
![](../../users/profiles/61277.webp)
user843521
- 61
- 1
- 4
1
vote
2 answers
Booting into Live USB Linux
If I have a Live USB Linux stick and I plug it into a computer which is not connected to the internet and boot the computer using the Live USB stick. How secure is this interms of not leaving any traces of work I do via the Live USB stick? i.e.…
![](../../users/profiles/1297.webp)
oshirowanen
- 705
- 3
- 10
- 21
1
vote
1 answer
Single user mode for Windows
I am familiar with single user mode on OSX. By holding down Command-S, you can boot into a terminal as root. Resetting the PRAM with Command-Option-P-R will disable any firmware protection that would otherwise prevent you from booting into single…
![](../../users/profiles/26352.webp)
mosca1337
- 175
- 1
- 6