diff --git a/README.md b/README.md index 66f5313..06cff72 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,7 @@ # Initrd encrypted root fs attack +![EvilAbigail](https://raw.githubusercontent.com/GDSSecurity/EvilAbigail/master/Screenshot.png) + ## Scenario * Laptop left turned off with FDE turned on * Attacker boots from USB/CD/Network @@ -185,4 +187,4 @@ Due to the above, a large number of processes attempt to load the `.so`. Becuase * Con: Reverse Engineering possible. Tricky, we only have what we bring with us * Rubber Ducky for when we can't boot from external media * Kernel patch to verify (sha?) checksum of initrd. Would require UEFI - secureboot laptop for testing purposes (fedora can do secureboot) \ No newline at end of file + secureboot laptop for testing purposes (fedora can do secureboot) diff --git a/Screenshot.png b/Screenshot.png new file mode 100644 index 0000000..40ff443 Binary files /dev/null and b/Screenshot.png differ