Firmware remote vulnerability in Intel business products
-------- Forwarded Message --------
Subject: Intel's Management Technology is indeed vulnerable
Date: Tue, 2 May 2017 19:49:54 +0200 (CEST)
From: I love OpenBSD <lampshade(a)poczta.fm>
To: misc(a)openbsd.org
INTEL-SA-00075
There is an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology versions firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 that can allow an unprivileged attacker to gain control of the manageability features provided by these products.
Can I preview a bitlink before clicking on it?
https://support.bitly.com/hc/en-us/articles/230650447-Can-I-preview-a-bitli…
Arstechnica:
http://bit.ly/2qyHCQn
Semiaccurate:
http://bit.ly/2pB2MjO
Intel's PDF:
http://intel.ly/2qAK4G0
Humble Book Bundle: Computer Graphics by CRC Press
4 days
USD1 (about AU$1.44) or greater
3D Engine Design for Virtual Globes
The Uncanny Valley in Games and Animation
Production Volume Rendering
Real-Time Volume Graphics
USD8 (about AU$11.56) or greater
Essential Skills in Character Rigging
Ray Tracing from the Ground Up
OpenGL Insights
Real-Time Shadows
Multithreading for Visual Effects
Graphics Shaders 2nd ed
Fluid Simulation for Computer Graphics 2nd ed
Digital Representations of the Real World: How to Capture, Model, and
Render Visual Reality
USD15 (about AU$21.67) or greater
3D Math Primer for Graphics and Game Development 2nd ed
GPGPU Programming for Games and Science
Mobile Crowd Sensing
Interaction Design for 3D User Interfaces
Digital Character Development: Theory and Practice 2nd ed
The Art of Fluid Animation
Ultra-Realistic Imaging
https://www.humblebundle.com/books/hacking-no-starch-press-books
Humble Book Bundle: Hacking 2.0 by No Starch Press
TIME LEFT 11 days
USD1 (about AU$1.44) or greater
The IDA Pro Book, 2nd ed: The Unofficial Guide to the World's Most Popular
Disassembler
Designing BSD Rootkits: An Introduction to Kernel Hacking
The Practice of Network Security Monitoring: Understanding Incident
Detection and Response
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Hacking the Xbox: An Introduction to Reverse Engineering
USD8 (about AU$11.56) or greater
Serious Cryptography: A Practical Introduction to Modern Encryption
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and
Exploitation
Pentesting Azure Applications: The Definitive Guide to Testing and Securing
Deployments
Practical Packet Analysis, 3rd ed: Using Wireshark to Solve Real-World
Network Problems
PoC||GTFO
USD15 (about AU$21.67) or greater
Linux Basics for Hackers: Getting Started with Networking, Scripting, and
Security in Kali
Malware Data Science: Attack Detection and Attribution
PoC||GTFO, Volume 2
Practical Binary Analysis: Build Your Own Linux Tools for Binary
Instrumentation, Analysis, and Disassembly
50% off voucher for PoC||GTFO & PoC||GTFO, Volume 2 at NoStarch.com