{"id":33193688,"url":"https://github.com/google/amt-forensics","last_synced_at":"2026-01-17T12:00:48.309Z","repository":{"id":65981014,"uuid":"107187106","full_name":"google/amt-forensics","owner":"google","description":"Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.","archived":true,"fork":false,"pushed_at":"2021-10-24T18:15:18.000Z","size":14,"stargazers_count":48,"open_issues_count":0,"forks_count":4,"subscribers_count":4,"default_branch":"master","last_synced_at":"2026-01-07T22:44:35.907Z","etag":null,"topics":["amt","forensics","intel","linux","mei"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/google.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2017-10-16T21:53:19.000Z","updated_at":"2025-12-09T13:22:40.000Z","dependencies_parsed_at":"2023-02-19T19:16:08.046Z","dependency_job_id":null,"html_url":"https://github.com/google/amt-forensics","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/google/amt-forensics","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Famt-forensics","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Famt-forensics/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Famt-forensics/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Famt-forensics/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/google","download_url":"https://codeload.github.com/google/amt-forensics/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Famt-forensics/sbom","scorecard":{"id":436348,"data":{"date":"2025-08-11","repo":{"name":"github.com/google/amt-forensics","commit":"132d68239ef20242c4bcd45526cd05cc1c4d0986"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4.3,"checks":[{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Dangerous-Workflow","score":-1,"reason":"no workflows found","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Maintained","score":0,"reason":"project is archived","details":["Warn: Repository is archived."],"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Code-Review","score":3,"reason":"Found 1/3 approved changesets -- score normalized to 3","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Token-Permissions","score":-1,"reason":"No tokens found","details":null,"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Pinned-Dependencies","score":-1,"reason":"no dependencies found","details":null,"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Vulnerabilities","score":10,"reason":"0 existing vulnerabilities detected","details":null,"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 2 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'master'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: github.com/google/.github/SECURITY.md:1","Info: Found linked content: github.com/google/.github/SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: github.com/google/.github/SECURITY.md:1","Info: Found text in security policy: github.com/google/.github/SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}}]},"last_synced_at":"2025-08-19T04:45:55.769Z","repository_id":65981014,"created_at":"2025-08-19T04:45:55.769Z","updated_at":"2025-08-19T04:45:55.769Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28508464,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-17T11:50:55.898Z","status":"ssl_error","status_checked_at":"2026-01-17T11:50:55.569Z","response_time":85,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["amt","forensics","intel","linux","mei"],"created_at":"2025-11-16T07:00:31.294Z","updated_at":"2026-01-17T12:00:48.291Z","avatar_url":"https://github.com/google.png","language":"Python","readme":"# AMT Forensics for Linux\n\nThis README contains instructions on how to use the scripts in this repository\nto retrieve Intel AMT's Audit Log from a Linux machine without knowing the\n**admin** user's password. The ideas from the script can be used to retrieve\nother pertinent information from Intel AMT via the ME Interface (MEI).\n\n[TOC]\n\n## Prerequisites\n\n1. Linux machine with a provisioned AMT\n  * For testing, you can [manually\nprovision](https://software.intel.com/sites/manageability/AMT_Implementation_and_Reference_Guide/WordDocuments/manualsetupandconfigurationfromrelease60.htm)\nAMT yourself in 10 steps.\n  * Make sure ```/dev/mei``` exists.\n     * You may need to ```sudo ln -s /dev/mei0 /dev/mei```.\n     * If this doesn't exist then this most likely means AMT is not\n       enabled \u0026 provisioned.\n\n2. Python \u0026 OpenWSMAN installed\n  * Python 2.7 with python-enum34 (```sudo apt-get install python-enum34```)\n  * The ```wsman``` binary in $PATH:\n     * ```sudo apt-get install wsmancli```\n     * For other platforms see https://openwsman.github.io/\n\n## Setup\n\nThe Local Manageability Service (LMS) for Linux needs to built and started:\n\n1. Download [lms-8.0.0-7.tar.gz](https://web.archive.org/web/20150804210131/https://software.intel.com/sites/default/files/lms-8.0.0-7.tar.gz)\n   and unzip it. You can read more info about LMS for Linux\n   [here](https://web.archive.org/web/20180829131835/https://software.intel.com/en-us/articles/download-the-latest-intel-amt-open-source-drivers/).\n2. Copy lms.patch from this repository into the unziped directory.\n3. Carry out the following commands:\n\n```shell\nuser@host:~/Downloads/lms-8.0.0-7$ patch -p1 \u003c lms.patch\nuser@host:~/Downloads/lms-8.0.0-7$ chmod u+x configure\nuser@host:~/Downloads/lms-8.0.0-7$ ./configure --enable-daemon=no\nuser@host:~/Downloads/lms-8.0.0-7$ # fix problems and re-run until all OK.\nuser@host:~/Downloads/lms-8.0.0-7$ make\nuser@host:~/Downloads/lms-8.0.0-7$ sudo src/lms\n```\n\nYou should be able to load http://localhost:16992/ in your browser now.\n\nNote: On some machines, restarting lms and/or machine is required.\n\nIf problems continue, re-try with **debugging** enabled:\n\n```shell\nuser@host:~/Downloads/lms-8.0.0-7$ make clean\nuser@host:~/Downloads/lms-8.0.0-7$ ./configure --enable-debug --enable-daemon=no\nuser@host:~/Downloads/lms-8.0.0-7$ make\nuser@host:~/Downloads/lms-8.0.0-7$ sudo src/lms\n```\n\n\n## Usage\n\nOnce LMS is successfully running as per above, start a new shell:\n\n```shell\nuser@host:~$ cd amt-forensics/\nuser@host:~/amt-forensics$ chmod u+x gather_audit_logs.sh\nuser@host:~/amt-forensics$ sudo ls # gather_audit_logs.sh does a hidden sudo\nuser@host:~/amt-forensics$ ./gather_audit_logs.sh\nuser@host:~/amt-forensics$ python ./decode_amt_auditlog.py \u003e decoded_log.txt\nuser@host:~/amt-forensics$ cat decoded_log.txt # Sample Output as example.\n[\n  {\n    \"AuditAppID\": \"NETWORK_TIME_APPID\",\n    \"EventID\": \"AMT Provisioning Started\",\n    \"InitType\": \"HTTP_DIGEST\",\n    \"UsernameLength\": 9,\n    \"Username\": \"$$OsAdmin\",\n    \"TimeStamp\": 1072922804,\n    \"TimeStamp_readable\": \"2004-01-01 03:06:44\",\n    \"MCLocationType\": \"IPV4_ADDR\",\n    \"NetAddressLength\": 9,\n    \"NetAddress\": \"127.0.0.1\",\n    \"ExtendedDataLength\": 4,\n    \"ExtendedData\": \"V\\\"\\u00b8\\u009c\"\n  },\n  {\n    \"AuditAppID\": \"SECURITY_ADMIN_APPID\",\n    \"EventID\": \"AMT Provisioning Started\",\n    \"InitType\": \"LOCAL_INITIATOR\",\n    \"TimeStamp\": 1506659359,\n    \"TimeStamp_readable\": \"2017-09-29 06:29:19\",\n    \"MCLocationType\": \"NONE\",\n    \"NetAddressLength\": 0,\n    \"ExtendedDataLength\": 0\n  }\n]\nuser@host:~/amt-forensics$\n```\n\n## Web Interface Login\n\nTo login via http://localhost:16992/logon.htm, you can\nobtain password for the user **$$osAdmin** as per follows:\n\n```shell\nuser@host:~/amt-forensics$ sudo python amt_local_sys_account.py\n[Password String]\nuser@host:~/amt-forensics$\n```\n\nYou can then use the username **$$osAdmin** and the printed password\nstring to login.\n\n## Info from all APIs\n\nThe ```getallinfo.sh``` script under the ```all_api_calls``` directory will\nattempt to gather info from all available AMT WSMAN APIs. This can be useful\nfor manual searching \u0026 inspiration during forensics.\n\n## Disclaimer\n\nThis is not an official Google product.\n\n","funding_links":[],"categories":["\u003ca id=\"505d67a56d03c921dd19737c28c3d8fc\"\u003e\u003c/a\u003eLinux"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgoogle%2Famt-forensics","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgoogle%2Famt-forensics","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgoogle%2Famt-forensics/lists"}