Network Pixies: Abusing PXE


Posted on in Presentations

PXE booting is prolific, and sees use for boot-time administration of physical (and virtual!) machines around the world. This session will discuss what PXE is and why we care, cover prior research around attacks on PXE boot, and demonstrate novel techniques to take control of the PXE boot process.
Participants
Brian Wallace

Participant

Data Scientist, Cylance

Andy Wortman

Participant

Staff Research Engineer, Cylance

DevSecOps & Application Security

network security


Topic

Subtopic


Share With Your Community