Recorded August 8, 2018
PXE Boot Attacks
Network administrators often utilize Pre-boot Execution Environment (PXE) to rapidly deploy new systems on a network easily. Golden system images can be created with all the software and settings already in place for new systems. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) discusses some of the potential attack vectors surrounding PXE boot deployments.
- NetSPI Blog on PXE Attacks - https://blog.netspi.com/attacks-against-windows-pxe-boot-images/
- PXEExploit Metasploit Module - https://www.rapid7.com/db/modules/auxiliary/server/pxeexploit
- Setup FOG for PXE Boot - https://www.theitcave.com/post/561