Maxim Goryachy

@h0t_max

Hardware/Software/Firmware/IntelME Researcher. Opinions are my own and not the views of my employer.

Vrijeme pridruživanja: rujan 2016.

Medijski sadržaj

  1. 12. stu 2019.

    Perfect keynote "Hardware Security is Hard: How Hardware Boundaries Define Platform Security" by on 2019

  2. 10. ruj 2019.

    News: Intel will release a new stepping for Apollo Lake SoC. But for this platform we: 1. published the ME-jtag exploit 2. revealed that Orange Unlock gives JTAG for the ME 3. got full access to Intel VISA Our advice: hurry up to buy the current stepping.

  3. 27. kol 2019.

    I won the auction and Richard Stallman sold me his mascot! "Happy Hacking!" (ɔ)

  4. 8. kol 2019.

    [1/3] So, has finally published "Behind the Scenes of Intel Security and Manageability Engine": . Let's see what we can find out?

    Prikaži ovu nit
  5. 18. srp 2019.
    Prikaži ovu nit
  6. 8. srp 2019.

    The video of our talk "Intel VISA:Through the Rabbit Hole" at 2019 released! [rus]

    Prikaži ovu nit
  7. 15. lip 2019.

    Thanks to , and for the perfect book! And special thanks to for free delivery;)

  8. 5. lip 2019.
    Prikaži ovu nit
  9. 5. lip 2019.

    The vulnerabilities (include unauthenticated RCE) in ZTE firmware discovered by me in 2018 has been finally disclosed on InfoSecurity Europe in London by Jimmy Jones. As of August 2018, I found the hundreds of thousands of vulnerable devices.

    Prikaži ovu nit
  10. 14. svi 2019.

    2/2 New portions of Intel vulnerabilities: The new RCE critical vulnerability in CSME 12.

    Prikaži ovu nit
  11. 11. tra 2019.

    Just two facts: 1.The site hosting the Intel presentation with info about CPU-unlock(special ID/PASS for chips unlocking, allowing to bypass almost all CPU/PCH security features) went down one week before our talk 2.The Intel presentation has gone from

  12. 1. tra 2019.

    We've updated our IntelTXE-POC. Now it allows you to bring up the main CPU and use all the amazing features of the Intel VISA technology.

  13. 13. velj 2019.

    Funny Intel's internal guide for impedance measuring of CPU: scalping, soldering, glue and tape;)

  14. 14. sij 2019.

    Thanks to for the Amazon gift card (presented for the reported vulnerability: ) I've bought the nice books.

  15. 7. stu 2018.

    ZTE has announced some of the devices that are affected by unauthorized RCE vulnerability which I found. Unfortunately, this firmware is end of life. Forever 0-days;)

  16. 29. ruj 2018.
    Odgovor korisniku/ci

    У меня для тебя плохие новости...

  17. 11. ruj 2018.
  18. 27. kol 2018.

    Almost year has passed since we reported the INTEL-SA-00086 vulnarability and we have published JTAG activation PoC for Intel ME. You can use JTAG for researching ME core (via DbC debug cable). Step-by-step instructions at

  19. 16. kol 2018.

    The first public results of my short ZTE GPON research: . ZTE support is strange: 1. no firmware for downloading from the site 2. security advisory without CVE reserved, CVSS-ratings and affected versions.

  20. 13. kol 2018.

    I accidentally found a new presentation about Intel ME (vPro) by Intel. A review of new capabilities, a indirect proof of the relationship between SGX and Intel ME.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·