Completed
Ideal vs Reality
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Intel AMT - Using & Abusing the Ghost in the Machine
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Project Goals
- 3 What is Intel AMT?
- 4 AMT Core Features
- 5 High Level Requirements for using Intel AMT
- 6 AMT Provisioning Options
- 7 AMT in the News
- 8 Open Source Tools
- 9 After those Goals are achieved?
- 10 Provisioning attack vectors
- 11 Attacker Goals (Updated)
- 12 Ideal steps for an attack
- 13 USB provisioning findings
- 14 Getting CIRA to work
- 15 Attacker assumptions for target laptop (Updated)
- 16 Attack Steps
- 17 User Detection
- 18 Mitigation
- 19 Prevention Options
- 20 First up: Due Diligence
- 21 Ask Intel for help
- 22 Ideal vs Reality
- 23 Learning from Windows Tool - $SosAdmin
- 24 Retrieving AMT Audit Log
- 25 Decoding the logs...