Hacker News
- Exploiting Intel’s Management Engine https://kakaroto.homelinux.net/2019/11/exploiting-intels-management-engine-part-1-understanding-pts-txe-poc/ 52 comments
Linked pages
- Libreboot â Frequently Asked Questions https://libreboot.org/faq.html 398 comments
- https://www.blackhat.com/docs/eu-17/materials/eu-17-goryachy-how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine.pdf 156 comments
- https://www.blackhat.com/docs/eu-17/materials/eu-17-goryachy-how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-wp.pdf 128 comments
- GitHub - ptresearch/IntelTXE-PoC: Intel Management Engine JTAG Proof of Concept https://github.com/ptresearch/IntelTXE-PoC 80 comments
- Trusted Platform Module - Wikipedia https://en.wikipedia.org/wiki/Trusted_Platform_Module 22 comments
- Intel Management Engine - Wikipedia https://en.wikipedia.org/wiki/Intel_Management_Engine 21 comments
- Return-oriented programming - Wikipedia https://en.wikipedia.org/wiki/Return-oriented_programming 12 comments
- Exploiting Intel’s Management Engine – Part 2: Enabling Red JTAG Unlock on Intel ME 11.x (INTEL-SA-00086) | KaKaRoTo's Blog https://kakaroto.homelinux.net/2019/11/exploiting-intels-management-engine-part-2-enabling-red-jtag-unlock-on-intel-me-11-x-intel-sa-00086/ 7 comments
Related searches:
Search whole site: site:kakaroto.homelinux.net
Search title: Exploiting Intel’s Management Engine – Part 1: Understanding PT’s TXE PoC (INTEL-SA-00086) | KaKaRoTo's Blog
See how to search.