SquidthePlummer (talk | contribs)
m somebody edited it before, however they did an amazing job and save me extra hours, thanks man!
SquidthePlummer (talk | contribs)
m cleaned things up and added a little bit more information and made corrections on some of the origional claims I've made
Line 21: Line 21:
==Intel AMT==
==Intel AMT==
One of the services utilizing the capabilities of the Intel ME is '''Intel Active Management (AMT)'''. It is part of a set of technologies marketed as Intel vPro. Intel AMT is built into most modern Intel CPUs, including but not limited to the Intel Core i5, Intel Core i7, Intel Core M, and Intel Xeon series. The AMT has full access to the system and can bypass system firewalls<ref name=":6" /><ref>{{Cite web |date=2021-01-05 |title=Intel® Active Management Technology Developers Guide |url=https://www.intel.com/content/www/us/en/docs/active-management-technology/developer-guide/2021/overview.html |url-status=live |access-date=2026-02-04 |publisher=Intel}}</ref>.
One of the services utilizing the capabilities of the Intel ME is '''Intel Active Management (AMT)'''. It is part of a set of technologies marketed as Intel vPro. Intel AMT is built into most modern Intel CPUs, including but not limited to the Intel Core i5, Intel Core i7, Intel Core M, and Intel Xeon series. The AMT has full access to the system and can bypass system firewalls<ref name=":6" /><ref>{{Cite web |date=2021-01-05 |title=Intel® Active Management Technology Developers Guide |url=https://www.intel.com/content/www/us/en/docs/active-management-technology/developer-guide/2021/overview.html |url-status=live |access-date=2026-02-04 |publisher=Intel}}</ref>.
 
[[File:Intel ME boot sequence.png|alt=Intel ME Boot Sequence for Laptops/Computers |thumb|Booting Process]]
AMT allows remote management of the system by using the ME's network access, exposing 2 ports through which commands can be issued. Some of the many features of the AMT are:<ref name=":6" />
AMT allows remote management of the system by using the ME's network access, exposing 2 ports through which commands can be issued. Some of the many features of the AMT are:<ref name=":6" />


* Access to hardware information
*Access to hardware information


* Remote power control
*Remote power control
* [https://software.intel.com/sites/manageability/HLAPI_Documentation/default.htm?turl=Documents%2Fbootcontrol.htm Boot control]  
*[https://software.intel.com/sites/manageability/HLAPI_Documentation/default.htm?turl=Documents%2Fbootcontrol.htm Boot control]
* Wake-on-LAN/Wake on wireless LAN
*Wake-on-LAN/Wake on wireless LAN
* Remote Schedule Maintenance (outside firewall)
*Remote Schedule Maintenance (outside firewall)
* KVM (keyboard, video, mouse) remote control
*KVM (keyboard, video, mouse) remote control
* Updating firmware
*Updating firmware


==Security==
==Security==
Line 43: Line 43:
|2009
|2009
|Developed by Invisible Things Lab, it was discovered that a bug allowed it to access the machine memory. <ref>{{Cite web |date=2008-08-26 |title=Intel patches the Q35 bug |url=https://theinvisiblethings.blogspot.com/2008/08/intel-patches-q35-bug.html |url-status=live |access-date=2026-02-03 |website=The Invisible Things Lab's blog}}</ref><ref name=":0">{{Cite web |first=402 Payment Required |date=2023-06-29 |title=Intel Management Engine |url=https://www.youtube.com/watch?v=lQ8k79yNH2A |url-status=live |access-date=2026-02-03 |website=Youtube}}</ref><ref name=":2">{{Cite web |last=Robin |first=Thibaud |date=2025-03-02 |title=The Mysterious Story of a Troubling Intel Chip |url=https://blog.trackflaw.com/en/the-mysterious-story-of-a-disturbing-intel-flea/ |url-status=live |access-date=2026-02-03 |website=TrackFlaw}}</ref>
|Developed by Invisible Things Lab, it was discovered that a bug allowed it to access the machine memory. <ref>{{Cite web |date=2008-08-26 |title=Intel patches the Q35 bug |url=https://theinvisiblethings.blogspot.com/2008/08/intel-patches-q35-bug.html |url-status=live |access-date=2026-02-03 |website=The Invisible Things Lab's blog}}</ref><ref name=":0">{{Cite web |first=402 Payment Required |date=2023-06-29 |title=Intel Management Engine |url=https://www.youtube.com/watch?v=lQ8k79yNH2A |url-status=live |access-date=2026-02-03 |website=Youtube}}</ref><ref name=":2">{{Cite web |last=Robin |first=Thibaud |date=2025-03-02 |title=The Mysterious Story of a Troubling Intel Chip |url=https://blog.trackflaw.com/en/the-mysterious-story-of-a-disturbing-intel-flea/ |url-status=live |access-date=2026-02-03 |website=TrackFlaw}}</ref>
|CVE-2008-1234
|'''Can't Find'''
|-
|-
|2010
|2010
Line 80: Line 80:
==References==
==References==
<references />
<references />
https://www.youtube.com/watch?v=Lr-9aCMUXzI
https://www.csoonline.com/article/562761/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html intel response to backdoor accusa
https://www.youtube.com/watch?v=RPC5f7EJN6U
<ref name=":1">{{Cite web |last=Portnoy |first=Erica |last2=Eckersley |first2=Peter |date=2017-05-08 |title=Intel's Management Engine is a security hazard, and users need a way to disable it |url=https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it |url-status=live |access-date=2026-02-03 |website=Electronic Frontier Foundation}}</ref>
https://leeneubecker.com/intels-secret-backdoor-can-now-be-turned-off/
https://hackaday.com/2017/12/11/what-you-need-to-know-about-the-intel-management-engine/
https://www.youtube.com/watch?v=ZpXkJqTAY5Y
https://www.youtube.com/watch?v=lQ8k79yNH2A
[[Category:{{PAGENAME}}]]
[[Category:{{PAGENAME}}]]