Anonymous ID: f502b0 Aug. 3, 2021, 9:02 a.m. No.14259432   🗄️.is 🔗kun   >>9455 >>9608 >>9760 >>9935 >>0121

>>14259317 (pb)

> Traceable log

Not necessarily.

If their hack was 100% in memory, there would be nothing on the machine itself. All the records and logs would be on their PXE/DHCP server or the router/firewall.

That's why they won't turn over the Splunk logs.

>>14259330 (pb)

> Wireless module

This can be faked.

If they've comp'd the operating system via PXE, then can have the OS list the WWAN as offline, even though the PXE loader has fired it up and put it to use.

The x86 and AMD64 commandset are filled with undocumented instructions, many of which were intentionally created to allow the systems to be compromised by (((intelligence agencies))).

The undocumented instruction set is a real thing.

https://hackaday.com/2021/03/26/undocumented-x86-instructions-allow-microcode-access/

Anonymous ID: f502b0 Aug. 3, 2021, 9:29 a.m. No.14259647   🗄️.is 🔗kun

>>14259633

> Dumb dubs

Read again, fren. It's disabled.

But since PXE boot is enabled, and it's a UEFI system with an Intel hypervisor, that's meaningless.

The system is rooted, and they can do w/e they want with it.

Anonymous ID: f502b0 Aug. 3, 2021, 9:41 a.m. No.14259753   🗄️.is 🔗kun   >>0066

>>14259681

> Suggests that network fags need to ponder PXE as a vulnerability

When shopping for network cards, I specifically avoid ones capable of PXE boot.

I also turn it off, first thing, as soon as I start work on a new system.

In the thirty years I've been working on computers, I've only used it twice.

Once to Ghostcast to a bunch of machines, and once for fun.

On small-to-medium sized networks, it's nothing but a vulnerability. And on large networks, it's hardly ever used owing to its complexity.