ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: PR011
  • Created: 25th May 2024
  • Updated: 24th July 2024
  • Contributor: The ITM Team

Boot Order Manipulation

A subject accesses BIOS or UEFI to manipulate the boot order of a target computer to boot from an external device in order to access the target computer's file system without needing to interact or authenticate with the Operating System of the target computer.