Главная
Study mode:
on
1
Intro
2
Project Goals
3
What is Intel AMT?
4
AMT Core Features
5
High Level Requirements for using Intel AMT
6
AMT Provisioning Options
7
AMT in the News
8
Open Source Tools
9
After those Goals are achieved?
10
Provisioning attack vectors
11
Attacker Goals (Updated)
12
Ideal steps for an attack
13
USB provisioning findings
14
Getting CIRA to work
15
Attacker assumptions for target laptop (Updated)
16
Attack Steps
17
User Detection
18
Mitigation
19
Prevention Options
20
First up: Due Diligence
21
Ask Intel for help
22
Ideal vs Reality
23
Learning from Windows Tool - $SosAdmin
24
Retrieving AMT Audit Log
25
Decoding the logs...
Description:
Explore the potential security vulnerabilities and forensic analysis techniques of Intel Active Management Technology (AMT) in this comprehensive conference talk from Hack.lu 2017. Delve into how attackers can exploit AMT's legitimate functionalities to gain persistent, undetectable access to modern machines. Learn about practical attack demonstrations, including a 60-second AMT ownership takeover method. Discover mitigation strategies and prevention techniques against such threats. Gain insights into non-destructive forensic processes for AMT systems with unknown admin passwords, and understand how to reclaim AMT ownership post-investigation. Examine the newly released Linux tooling for AMT forensics. Understand AMT's role as an out-of-band management technology in Intel chipsets, its prevalence in business and high-end consumer devices, and its implications for remote management and security.

Intel AMT - Using & Abusing the Ghost in the Machine

Cooper
Add to list
0:00 / 0:00