Hacker News new | comments | show | ask | jobs | submit login

Point your curl at port 16992 of the target machine, you'll get something like:

$ curl -v http://server:16992

> GET / HTTP/1.1

> Host: server:16992

> User-Agent: curl/7.47.0

> Accept: /

>

< HTTP/1.1 303 See Other

< Location: /logon.htm

< Content-Length: 0

< Server: Intel(R) Active Management Technology 8.1.10




I went to my BIOS and turned AMT "on". I turned off my modem and connected my Lenovo to Ethernet. I sshed into another machine, and ran the curl command back at the Lenovo. I tried ports 16992 and 16993 per the article. And I got no such response.

This shit is never clear, but did I have to actively turn this thing on to be vulnerable to the remote variant of this attack?




Applications are open for YC Summer 2018

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: