Intel AMT - Using & Abusing the Ghost in the Machine
Offered By: Cooper via YouTube
Course Description
Overview
Explore the potential security vulnerabilities and forensic analysis techniques of Intel Active Management Technology (AMT) in this comprehensive conference talk from Hack.lu 2017. Delve into how attackers can exploit AMT's legitimate functionalities to gain persistent, undetectable access to modern machines. Learn about practical attack demonstrations, including a 60-second AMT ownership takeover method. Discover mitigation strategies and prevention techniques against such threats. Gain insights into non-destructive forensic processes for AMT systems with unknown admin passwords, and understand how to reclaim AMT ownership post-investigation. Examine the newly released Linux tooling for AMT forensics. Understand AMT's role as an out-of-band management technology in Intel chipsets, its prevalence in business and high-end consumer devices, and its implications for remote management and security.
Syllabus
Intro
Project Goals
What is Intel AMT?
AMT Core Features
High Level Requirements for using Intel AMT
AMT Provisioning Options
AMT in the News
Open Source Tools
After those Goals are achieved?
Provisioning attack vectors
Attacker Goals (Updated)
Ideal steps for an attack
USB provisioning findings
Getting CIRA to work
Attacker assumptions for target laptop (Updated)
Attack Steps
User Detection
Mitigation
Prevention Options
First up: Due Diligence
Ask Intel for help
Ideal vs Reality
Learning from Windows Tool - $SosAdmin
Retrieving AMT Audit Log
Decoding the logs...
Taught by
Cooper
Related Courses
I Boot when U-Bootnullcon via YouTube The Internet of Insecure Things - 10 Most Wanted List
YouTube Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
Black Hat via YouTube Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller
Black Hat via YouTube Securing Your In-Ear Fitness Coach - Challenges in Hardening Next Generation Wearables
Black Hat via YouTube