Closed favoritewky closed 4 months ago
My best guess is that your BIOS/UEFI doesn't protect against DMA attacks - which makes it vulnerable.
Recent Windows versions (Win11) have lots of anti-DMA features enabled by default. You can try to log on to the computer from the lock screen (it may then start to work) or disable the IOMMU/VT-d feature in UEFI.
There are also other alternatives that may work since you have a vulnerable UEFI, I'm thinking about corrupting the DMAR ACPI table - it won't affect windows boot (unless they changed something in recent version) but it will prevent Windows from enabling the anti-DMA features. I have an old blog entry about it http://blog.frizk.net/2016/11/disable-virtualization-based-security.html
I'm closing this issue due to old age.
Hello Ulf,
Firstly, I’d like to thank you for your hard work and dedication as I understand these are your hobby projects. I’m quite new to this so please forgive me if I make a beginner mistake.
Myboard is Screamer PCIe Squirrel The hack computer is WIN10 21H2 The target computer is WIN10 21H2 with the vmx&vt/d disable Intel i5-10400.
When I run probe when the target is in bios setup. It can read the memory without the first 32 page.
But when the Windows is starting, it become failed to the end.
I have try many times but I can't understand why it happend,and how can I solve it. Thanks!