[b][/b]
[i][/i]
[u][/u]
[s][/s]
[code][/code]
[quote][/quote]
[spoiler][/spoiler]
[url][/url]
[img][/img]
[video][/video]
Smileys
smile
smile2
spook
alien
zunge
rose
shy
clown
devil
death
flash
sick
heart
idee
frage
blush
smokin
mad
sad
wink
frown
crazy
grin
hmm
laugh
mund
oh
rolling_eyes
lil
oh2
shocked
cool
[mail][/mail]
[pre][/pre]
Farben
[rot][/rot]
[blau][/blau]
[gruen][/gruen]
[orange][/orange]
[lila][/lila]
[weiss][/weiss]
[schwarz][/schwarz]
Yorickdowne
Posts: 2 | Last online: 05.05.2017
Name
Thorsten Behrens
Wohnort
Springfield
Date registered
04.20.2017
Sex
male
    • Yorickdowne has written a new post "Intel Management Engine: Drivers, Firmware & System Tools" 05.05.2017

      Zitat von e.v.o im Beitrag #2813
      Also Intel says "This vulnerability does not exist on Intel-based consumer PCs"... i really dunno what to expect from all of this and i am curious about the whole situation.

      This vulnerability targets all systems not only AMT enabled?


      This is all bloody confusing. What I can gather from Intel's advisory:
      - Remote privilege escalation is possible on AMT and ISM
      - Local privilege escalation is possible on AMT, ISM and SBT

      If ME is present but none of those management methods are present or provisioned, the system is not vulnerable.

      To be sure, run the detection program that can be found here: https://downloadcenter.intel.com/downloa...Detection-Guide .

      If you are vulnerable and this isn't an AMT-managed corporate machine, just disable AMT in BIOS for now.

      Here's an article by the CTO of Embedi, trying to set the record straight as to what this is and isn't. It's unrelated to the "ME is a rootkit" rant from June 2016. https://threatpost.com/researcher-basele...ability/125390/

      That "ME is a rootkit" rant is useful though to get a better understanding of the structure of ME. That's here: http://boingboing.net/2016/06/15/intel-x...-ship-with.html

    • Yorickdowne has written a new post "[Guide] Using CH341A-based programmer to flash SPI EEPROM" 04.20.2017

      If you're looking for the latest software version (1.31 as of April 2017), and you want to support the author, you can buy it for 10 bucks. This will work with the "programmer on a stick" CH341A USB programmers you can find on Amazon, eBay, etc.

      - Send email to skygz@qq.com, telling him you'd like to buy his CH341A programmer software.
      - He'll send you an email back with a Paypal link, warn you not to pirate his stuff, and ask for a yahoo.com address - apparently because gmail will not allow EXE files inside ZIP to be attached
      - Once you've paid, he'll send a ZIP file with a customized EXE inside (and drivers). The EXE has your name
      - Run the EXE, send him an email with the username and hardware id it displays
      - He'll send you an XML file. "Import" that and you have a licensed, personalized copy. Future software updates are free.

      It's a convoluted buying process. Still, it beats scrounging around for hacked copies, in my book.

Recipient
Yorickdowne
Subject:


text:
{[userbook_noactive]}


Xobor Forum Software von Xobor