Sudo ./mei-amt-check

sudo ./mei-amt-check
Error: Management Engine refused connection. This probably means you don't have AMT


:)

Other urls found in this thread:

github.com/mjg59/mei-amt-check
security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
ssh.com/vulnerability/intel-amt/
downloadcenter.intel.com/download/26755
twitter.com/SFWRedditGifs

n-nani?

github.com/mjg59/mei-amt-check

>Based on the analysis performed by this tool, this system is not vulnerable; the ME SKU is not affected

y-you mean intel is spying on me?

Yes, but that's not the issue at hand here.
security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
ssh.com/vulnerability/intel-amt/

Honestly fuck Intel, I'll be buying AMD CPUs from now on.

Intel AMT is present
AMT is unprovisioned


wat do

enjoy you're botnet

AMD has it's own ME-like subsystem, which is even more exploitable. You stupid anime posting nigger.

>which is even more exploitable
lmao

>If you have anything connected to the Internet with AMT on, disable it now. Assume the server has already been compromised.

AMD has backdoors on their CPUs as well you uneducated, NEET trash.

Nice damage control.

Wat do then?

How does Snowden and other hax0rs even hide if both cpus are exploitable?

The Thinkpad T60p does not have this problem.

>mfw my t60p is incapable of running win 10 or Linux because of buggy drivers

So basically use dual core old as hell cpus?

It runs linux just fine. And why would you want anything after win7, lel

I got the same. MSI GE-60 with a 4700MQ for reference. You?

>the truth is damage control

Nice damage control

Use pre 2006 CPUs.

Twf i have thrown away my old amd athlon xp 2200+

If the AMT vulnerability was used to infect a system, would patching the vulnerability to reinstalling the OS fix it? Or would it be some sort of unremovable malware?

Might not help. In the one system I have with AMT, it says Management Engine (c) 2003-

>Error: Management Engine refused connection.

>wat do
Relax, because you're not vulnerable, at least not to the exploit in question.

>In essence, the web user interface uses HTTP digest authentication for theadminaccount. Send an empty digest response, and you are in. That simple. About five lines of Python. Maybe ten if you make it pretty.
you can't make this shit up

those ivory tower eggheads have screwed us all again as usual

>the truth is damage control
So I suppose you'll be promptly disclosing this vulnerability and/or backboor in AMD's management software/hardware?

how do I kill AMT?

Use the intel tool and "unprovision" it, the best you gonna get at the moment

am I vulnerable?

>bash on windows
yeah, without a doubt
Download the official Intel tool here
downloadcenter.intel.com/download/26755
and follow the god damn instructions, pretending you're on Linux is just gonna server the jews agenda.

I installed it and run it but it does nothing

Yes it does, it tells you whether or not you are a shitter

the black screen is when UAC comes up
you can see nothing happens when I start the program

What if I never provisioned it in the first place?

Did you try using the GUI version? And why does UAC mess with your monitor?

Good thing I disabled AMT in the BIOS

this is the gui version
console version does also nothing
the UAC makes the screen go darker and a window comes up in the middle of the screen where I can allow it to run in admin mode. the screen recorder does not record this

Dude this exploit is pretty fucked up

That doesn't fix it retard

roll your own hardware

alternatively give up on technology alltogether

>Hungarian

die

why so hostile?

Because I'm Hungarian.

you're lying
Hungarians don't hate each other

wew 2600k is safe from this particular botnet

>Error: Management Engine refused connection. This probaly means you don't have AMT.

Core 2 quad Q660 doesn't have this problem.

Rundown please?

there is a backdoor is every intel CPU after the intel core 2 series called the AMT. Its exploitable this tool will show you if you are effected. (on linux or mac osx) if you are effected their are patches by intel you can get on their website.