Intel AMT: Using & Abusing the Ghost in the Machine
Parth Shukla - timevortex@google.com Enterprise Infrastructure Protection
1
Intel AMT: Using & Abusing the Ghost in the Machine Parth - - PowerPoint PPT Presentation
Intel AMT: Using & Abusing the Ghost in the Machine Parth Shukla - timevortex@google.com Enterprise Infrastructure Protection 1 Project Goals 1 Explore the best* practical attack using Intel AMT 2 Present a holistic perspective
1
*stealthiest attack with least amount of effort
2
3
4
5
Disabled Enabled Provisioned Unprovisioned AMT Module within ME OOB Admin Access
BIOS setting AMT setup (local or OS or remote) Manufacturer decision
AMT supporting Hardware profile
6
CCM = Client Control Mode => Limits AMT functionality ACM = Admin Control Mode => No limitations *Can be upgraded to ACM with additional steps
7
Provisioning Method Provisioning Mode Local Agent on OS CCM* Remote ACM USB ACM Physically via BIOS MEBx menu ACM
◆ Patch available for all affected versions
8
9
10
11
12
Note: The attacks are not specific to AMT
13
*Target Device: Lenovo X1 Carbon 2016 with AMT 11
14
15
16
17
Bad Good
MeshCommander used to create ‘setup.bin’
USB provisioning works painlessly
Cannot set CIRA settings via USB
Remote provisioning server can be set
Provisioning server in turn can set up CIRA
18
19
20
◆ Using MeshCommander
◆ Using MeshCentral2
21
22
23
24
(must not load WiFi driver in custom OS)
Note: Over time, Intel may bridge feature-gap between WiFi and LAN to bring parity
25
26
27
28
29
Note: Difficulty described is for an enterprise with large fleet of machines
30
31
32
33
34
35
36
37
Source: Page 45, Chapter 2, Platform Embedded Security Technology Revealed by Xiaoyu Ruan *Linux LMS = https://software.intel.com/en-us/articles/download-the-latest-intel-amt-open-source-drivers
38
*Repository contains LMS patch + code to dump log along with a README file
39
*Repository contains the decoding code
40
41
◆ Comes with Linux mesh agent from meshcommander.com ◆ Source & Windows stand-alone binary available
◆ Makes every AMT WSMAN API call and saves it as a JSON
42
43
44
45
46
License for below: https://creativecommons.org/publicdomain/zero/1.0/deed.en Slide 3: StockSnap, https://pixabay.com/en/cup-coffee-mug-notes-diary-pen-2572893/ Slide 10: geralt, https://pixabay.com/en/woman-stylish-at-internet-network-163426/ Slide 11 & 14: TeroVesalainen, https://pixabay.com/en/target-goal-success-dart-board-1955257/ Slide 15 & 20: mstlion, https://pixabay.com/en/stamp-accepted-symbol-accept-1966698/ Slide 26: OpenClipart-Vectors, https://pixabay.com/en/sherlock-holmes-detective-147255/ Slide 31: geralt, https://pixabay.com/en/matrix-binary-security-code-2503236/ Slide 33: DirtyOpi, https://pixabay.com/en/funny-pictures-funny-676672/
47
License for below: https://creativecommons.org/publicdomain/zero/1.0/deed.en Slide 34: 472301, https://pixabay.com/en/checklist-clipboard-questionnaire-1622517/ Slide 35: OpenClipart-Vectors, https://pixabay.com/en/help-button-red-emergency-support-153094/ Slide 41: JerzyGorecki, https://pixabay.com/en/bridge-wooden-bridge-transition-2769777/ Slide 43: dramitkarkare, https://pixabay.com/en/restart-cushions-funny-ctrl-alt-del-2787877/ Slide 45: OpenClipart-Vectors, https://pixabay.com/en/note-notepad-pad-paper-remember-2025016/ Slide 46: jarmoluk, https://pixabay.com/en/microphone-it-lecture-entry-sound-2775447/
48