Intel AMT - Using & Abusing the Ghost in the Machine

Intel AMT - Using & Abusing the Ghost in the Machine

Cooper via YouTube Direct link

Attacker assumptions for target laptop (Updated)

15 of 25

15 of 25

Attacker assumptions for target laptop (Updated)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Intel AMT - Using & Abusing the Ghost in the Machine

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Project Goals
  3. 3 What is Intel AMT?
  4. 4 AMT Core Features
  5. 5 High Level Requirements for using Intel AMT
  6. 6 AMT Provisioning Options
  7. 7 AMT in the News
  8. 8 Open Source Tools
  9. 9 After those Goals are achieved?
  10. 10 Provisioning attack vectors
  11. 11 Attacker Goals (Updated)
  12. 12 Ideal steps for an attack
  13. 13 USB provisioning findings
  14. 14 Getting CIRA to work
  15. 15 Attacker assumptions for target laptop (Updated)
  16. 16 Attack Steps
  17. 17 User Detection
  18. 18 Mitigation
  19. 19 Prevention Options
  20. 20 First up: Due Diligence
  21. 21 Ask Intel for help
  22. 22 Ideal vs Reality
  23. 23 Learning from Windows Tool - $SosAdmin
  24. 24 Retrieving AMT Audit Log
  25. 25 Decoding the logs...

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.