-
Notifications
You must be signed in to change notification settings - Fork 120
efiXplorer features
yeggor edited this page Nov 5, 2024
·
7 revisions
| Feature name | 32-bit | 64-bit |
|---|---|---|
| Boot Services | + | + |
| Runtime Services | + | + |
| SMM services | - | + |
| PEI Services | + | - |
| Protocols | + | + |
| GUIDS | + | + |
| Applying types for local variables | + | + |
| Vulnerabilities scanner | + | + |
| Report in JSON format | + | + |
| Loader | - | + |
| Dependency graph | - | + |
Annotate Boot Services calls in assembly code automatically:

Annotate Runtime Services calls in assembly code automatically:

Annotate SMM Services calls in assembly code automatically:

Annotate PEI Services calls in assembly code automatically:

Build the list of EFI Protocols firmware consumes and installs:

Build the list of identified EFI GUIDs (including protocol names for known GUIDS):

This feature works only in conjunction with a HexRays decompiler. If you don't have a HexRays decompiler, build efiXplorer without hexrays_sdk.
efiXplorer scans drivers for the following types of vulnerabilities:
- SMM callouts
- OOB Write via wrong
GetVariableusage (in PEI, DXE and SMM drivers)
At the end of the analysis, a chooser is displayed with the suspected vulnerabilities.
After analysis efiXplorer saves the report in JSON format.