User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 39
  6. 40
  7. 41
  8. 42

Posts That Were Thanked by mashlehash

  1. Originally posted by 1337 Does 4J still go on TC?

    Two questions to tell if a poster/former poster goes on TC:

    Is said poster mmQ?
    Is said poster a hardcore faggot?

    If the answer to both questions is "no", said poster is not on TC
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. aldra JIDF Controlled Opposition
    SHORT VERSION:
    Intel's Management Engine, or Active Management Technology, depending on where you look is a low-level subsystem that's attached to every Intel chip produced after 2008 (I believe). It runs whenever the chip is powered (even if the computer itself is switched off), and it's purpose is to 'provide trust' that the processor isn't compromised. It's completely invisible to the user, but has complete access to the processor as well as access to power up or down the machine, interfere with the boot process, send/receive TCP network traffic through it's own independent MAC forwarded by the network adapter and run arbitrary code locally. Efforts to dump it's code and understand it's workings, potentially leading to an exploit are underway but due to the way the core firmware is compressed and obfuscated, as well as peripheral functions being stored on ROM chips, makes progress very difficult.

    When it's exploited, if it hasn't been already, every machine running a recent Intel chip will be outfitted with a rootkit that can't be disabled (breaking or disabling the ME coprocessor forces the computer to shut down on a timer). Don't think switching to AMD will make much of a difference either... They have a very similar system (TrustZone) that's implemented via an on-chip ARM coprocessor.


    TECHNICAL:
    The AMT unit itself is a separate on-chip coprocessor that has several supporting components such as ROM and RAM for firmware and temporary data storage as well as a 'DMA engine' that allows it unfettered access to memory in use by the user-installed operating system, meaning it can potentially subvert the program flow of Windows, Lunix or whatever OS you're using without any warning or indication. It also has it's own simple TCP stack which has been demonstrated to be insecure in the past; it has a hardcoded MAC address different to the standard NIC and is essentially able to relay through the NIC to forward requests to the internet or LAN. The ME engine itself is composed of the core firmware which is compressed, encrypted and obfuscated, only decoded on the fly to run commands, and modules and components stored on ROM chips, which cannot be dumped or accessed directly.

    The original purpose of the AMT was to provide trust for the CPU itself; you may compile applications from source because you want to be able to see what it does before you 'trust' it enough to compile, but you then also need to be able to trust the compiler that builds it, and dependencies that get linked in and anything that runs below the application, ie. the operating system, drivers used and the like. You can continually move down the chain, checking source or watching applications' behaviour to verify they're working as advertised, but once you get to hardware, specifically the processor in this case, it's a black box - there's no way to directly view the source, so the only way to 'trust' that it's not compromised is through a third-party that can verify such. This begs the question of how you can verify that the third-party is trustworthy - you can't. One of it's popular uses now is to facilitate remote installations and administration functionality on behalf of sysadmins.

    OTHER:
    It would surprise me if some of the betabet agencies don't already have access to this - it may have even be among the exploits stolen from the NSA's archives, but hasn't been released because whoever released them publicly knew of it's value. Much of the system's code is stored on ROM chips and untouchable; it cannot be reflashed or updated meaning that if an exploit exists in it, there is nothing users can do to protect themselves - they'd literally need to buy a new processor once Intel gets around to patching or rewriting the AMT codebase.

    Manufacturers have ostensibly worked with NSA contractors in the past, specifically in the case of harrdrive firmware exploits used to cache and transmit data - without co-operation from the major harddrive manufacturers, such an exploit would take years to develop per manufacturer, and there are around 10 of them.

    COUNTERMEASURES:
    At the moment, there's very little that can be done to mitigate your risk of being exploited because even if no exploit exists today, it will. Disabling the AMT platform causes the computer to shut down after a countdown, but it's been observed that if chunks of the WMT's firmware are erased or overwritten, it stays in the 'running' state but stops responding

    You may be able to sniff TCP data to/from the platform by enhancementing by MAC address, but I'm not sure how possible it is to mask those requests.
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. mmQ Lisa Turtle
    I still do high school track
    The following users say it would be alright if the author of this post didn't die in a fire!
  4. kroz weak whyte, frothy cuck, and former twink
    Originally posted by RisiR Someone put an ISIS flag in the background of this and a jihad quote in Arabic. Captain Falcon can pay some dudes on Craigslist to put the pics all over Austin.

    I PMd Scrawny about it months ago but he is just a useless shit.

    Go! Go! Go!

    lol i already have a long and prosperous history here in austin. And everyone knows that im catholic

    I've been trolled so many times on craigslist here in austin that it would never stick

    The following users say it would be alright if the author of this post didn't die in a fire!
  5. mmQ Lisa Turtle
    Originally posted by aldra why though

    To raise awareness for fibromyalgia.
    The following users say it would be alright if the author of this post didn't die in a fire!
  6. Holy hell, son. First niggers kicked your ass and now the cops too. Who's gonna kick your ass next month? The Mexicans?
    \

    The following users say it would be alright if the author of this post didn't die in a fire!
  7. kroz weak whyte, frothy cuck, and former twink






    all warfare is based on deception
    The following users say it would be alright if the author of this post didn't die in a fire!
  8. wow man. You are a hardcore faggot.

    Pick up a text book or learn some shit from the local community college (as you are obviously not smart enough to go to a real college).

    All this "its inside your mind" shit is high level retarded and you should probably be euthanized.
    The following users say it would be alright if the author of this post didn't die in a fire!
  9. How about a science and math forum nigga?
    The following users say it would be alright if the author of this post didn't die in a fire!
  10. -SpectraL coward [the spuriously bluish-lilac bushman]
    I would rather challenge it. Nothing like a good back and forth with a werewolf. I'd introduce it to a hay-maker to start, then I'd knee it in the stomach, grab its head in a grip of steel headlock, twist it onto its back, and then break its neck with the heel of my foot. That werewolf would wish he never left his mother's cave once I was done with it.
    The following users say it would be alright if the author of this post didn't die in a fire!
  11. Merlin Houston
    Here is a shitty script I wrote to help automate my backup process. It's meant to be used in conjunction with rsync. Say you have a folder backup it will make a copy of it called backup_MM_YY for versioning. If it sees that there is no version for the current month one will be created. You specify how many versions and it will trim the old ones.

    I did not realize bash functions couldn't handle named parameters and I can't bring myself to care enough to make the pieces more portable.

    sortByTimeStampAndPurge () {
    dir="/home/macfag/" # dir to work in
    folder="gaypr0n" # file / folder base name to work with: baseName_mm_yy
    curMonth=$(date +"%m")
    curYear=$(date +"%y")
    versions=3 # how many revisions to keep
    lastMonth=""
    lastYear=""

    cd $dir

    # firsts make array of folder names
    i=0
    files[0]=""
    for f in ${folder}_*
    do
    files[i]=$f
    ((i++))
    done
    # sort them by actual timestamp
    for (( i = (${#files[@]}-1); i >= 0; i-- )); do
    for (( j = 1; j <= $i; j++ )); do
    if [ $(stat -c %Y ${files[$j-1]}) -gt $(stat -c %Y ${files[$j]}) ]
    then
    tmp=${files[$j-1]}
    files[$j-1]=${files[$j]}
    files[$j]=$tmp
    fi
    done
    done

    # check there is an old copy
    if [ ${files[${#files[@]}-1]} != "${folder}_*" ]
    then
    # if the last copy is labelled more than a month old: copy it
    lastMonth=${files[${#files[@]}-1]:${#folder}+1:2}
    lastYear=${files[${#files[@]}-1]:${#folder}+4:2}
    if [ $curYear -gt $lastYear ]
    then
    cp -r $folder ${folder}_${curMonth}_${curYear}
    files[${#files}]=${folder}_${curMonth}_${curYear}
    elif [ $curMonth -gt $lastMonth ] && [ $curYear -eq $lastYear ]
    then
    cp -r $folder ${folder}_${curMonth}_${curYear}
    files[${#files}]=${folder}_${curMonth}_${curYear}
    fi
    else
    # there only exists the main backup, no versioning yet, create one
    cp -r $folder ${folder}_${curMonth}_${curYear}
    files[${#files}]=${folder}_${curMonth}_${curYear}
    fi

    # trim extra files that might exist
    for (( i = ${#files[@]}-1; i >=0; i--)); do
    if [ $versions -le 0 ]
    then
    rm -r ${files[$i]}
    fi
    ((versions--))
    done
    }

    sortByTimeStampAndPurge

    The following users say it would be alright if the author of this post didn't die in a fire!
  1. 1
  2. 2
  3. 3
  4. ...
  5. 39
  6. 40
  7. 41
  8. 42
Jump to Top