From b1842e66992543e480b3dd18a1cf221376e547cc Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Stanis=C5=82aw=20Bieniek?= Date: Mon, 17 Jun 2024 14:33:18 +0200 Subject: [PATCH] training: fix-UEFI-spelling --- content/training.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/content/training.md b/content/training.md index 05e5d84..7d5574e 100644 --- a/content/training.md +++ b/content/training.md @@ -191,14 +191,14 @@ trainings: * boot flow from power on to system take off * understading Intel security features * attacking Intel security features - * overview most popular Uefi forensics tools + * overview most popular UEFI forensics tools * firmware weakness analysis * SMM known attacks – theory and practice * TPM * Intel TXT and SGX - * Uefi variables and S3 attacks + * UEFI variables and S3 attacks * Update mechanism exploitation - * Non Uefi attack vectors WiFi/BT/3G/4G and USB + * Non UEFI attack vectors WiFi/BT/3G/4G and USB * DMA as an attack vector * recent Lenovo and Dell vulnerabilities