Written by Bruno · 2018-12-18 · in Exploit
[…]In summary, if we consider we have found a vulnerability allowing to call an arbitrary address in SMM, the final steps for the exploitation are:[…]
https://www.synacktiv.com/posts/exploit/code-checkmate-in-smm.html