Overview
Syllabus
Intro
Project Goals
What is Intel AMT?
AMT Core Features
High Level Requirements for using Intel AMT
AMT Provisioning Options
AMT in the News
Open Source Tools
After those Goals are achieved?
Provisioning attack vectors
Attacker Goals (Updated)
Ideal steps for an attack
USB provisioning findings
Getting CIRA to work
Attacker assumptions for target laptop (Updated)
Attack Steps
User Detection
Mitigation
Prevention Options
First up: Due Diligence
Ask Intel for help
Ideal vs Reality
Learning from Windows Tool - $SosAdmin
Retrieving AMT Audit Log
Decoding the logs...
Taught by
Cooper