If you ever want to try an easy exploit, I recommend the Intel AMT Vulnerability CVE 2017-5689. This vulnerability is slightly scary because it's a firmware vulnerability that is accessible remotely. The only problem: You need a computer that has an Intel VPro Core processor. Those are usually sold to businesses. They are easily spotted because they usually have a nice sticker that says its a VPro Core Processor. Not always though. Sometimes the sticker is removed, or it never had one, so check the processor specs online if you aren't sure.
Items Needed:
Computer with an Intel Core VPro Processor
AMT drivers and software
Firefox and Tamper Data-or whatever you prefer to use to tamper with html requests.
The vulnerable processors and AMT version numbers are here:
https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00075&languageid=en-fr
Here is a getting started guide for setting up Intel AMT, if you'd like to try to exploit this vuln:
https://software.intel.com/en-us/articles/getting-started-with-intel-active-management-technology-amt
The only nightmare is getting the computer configured to be vulnerable. I found that if you custom install Windows, that some of the required drivers are not present, so you have to look up your computer model number and install the drivers. Once that is done, it's not so bad to configure.
You have to configure it in Intel Management Engine BIOS extension (Intel MEBx). For the computer I was testing, I had to press Ctrl-P before the computer booted into Windows to access that menu. Then you just configure all the options. Piece of Cake.
There's plenty of tutorials about how to exploit the vuln. One is here:
https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00075&languageid=en-fr
The user has to be admin, or a valid user, otherwise, obviously, it won't log you in.
Thankfully, it looks like this vuln has been patched, so make sure to install the patch if you have vulnerable systems.
It's good to be admin. :) Have fun.
No comments:
Post a Comment