Difference between revisions of "Pyongyang night"
(Created page with "# Pyongyang Night ``` ██████╗ ██╗ ██╗ ██████╗ ███╗ ██╗ ██████╗ ██╗ ██╗ ███╗...") |
|||
Line 1: | Line 1: | ||
− | |||
− | + | = Pyongyang Night = | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | ''"A thousand CPUs went dark before dawn."'' | |
− | |||
− | + | '''Pyongyang Night''' is an open-source OPSEC hardening project focused on disabling known Western surveillance backdoors ("Yankee daemons") in Intel and AMD CPUs. This includes Intel ME, AMD PSP, fTPM, and associated firmware-based threats. It offers guides and tools to permanently neutralize these subsystems and restore sovereignty to your machines. | |
− | ** | + | == Table of Contents == |
+ | * [[#Overview|Overview]] | ||
+ | * [[#Intel: Removing the Management Engine (ME)|Intel: Removing the Management Engine (ME)]] | ||
+ | * [[#AMD: Disabling the Platform Security Processor (PSP)|AMD: Disabling the Platform Security Processor (PSP)]] | ||
+ | * [[#Recommended Tools|Recommended Tools]] | ||
+ | * [[#Post-Cleanup OPSEC Practices|Post-Cleanup OPSEC Practices]] | ||
+ | * [[#Contributions|Contributions]] | ||
− | --- | + | ---- |
− | + | == Overview == | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | - | + | Modern x86 systems ship with embedded management controllers that run below the OS level. These controllers—Intel ME and AMD PSP—have unrestricted access to memory, peripherals, and network devices. They are proprietary, closed-source, and required for "Secure Boot" and other platform lockdown mechanisms. |
− | + | == Intel: Removing the Management Engine (ME) == | |
− | + | '''Step 1:''' Check if your system is vulnerable | |
+ | * Target systems: Intel platforms from 2008–2017 (Core 2 through Skylake/Kaby Lake) | ||
+ | * Look for ME version 6.x – 11.x | ||
− | + | '''Step 2:''' Install dependencies: | |
− | + | <syntaxhighlight lang="bash"> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
sudo apt install flashrom python3 git build-essential | sudo apt install flashrom python3 git build-essential | ||
− | + | </syntaxhighlight> | |
− | + | '''Step 3:''' Dump firmware: | |
− | + | <syntaxhighlight lang="bash"> | |
flashrom -p internal -r backup.rom | flashrom -p internal -r backup.rom | ||
− | + | </syntaxhighlight> | |
− | + | '''Step 4:''' Clean ME using me_cleaner: | |
− | + | <syntaxhighlight lang="bash"> | |
git clone https://github.com/corna/me_cleaner.git | git clone https://github.com/corna/me_cleaner.git | ||
cd me_cleaner | cd me_cleaner | ||
python3 me_cleaner.py -S ../backup.rom -o cleaned.rom | python3 me_cleaner.py -S ../backup.rom -o cleaned.rom | ||
− | + | </syntaxhighlight> | |
− | + | '''Step 5:''' Flash cleaned firmware: | |
− | + | <syntaxhighlight lang="bash"> | |
flashrom -p internal -w cleaned.rom | flashrom -p internal -w cleaned.rom | ||
− | + | </syntaxhighlight> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | == AMD: Disabling the Platform Security Processor (PSP) == | |
− | + | '''Step 1:''' Disable fTPM in BIOS | |
− | + | '''Step 2:''' Disable Secure Boot | |
− | + | '''Step 3:''' Monitor PSP activity (Linux): | |
− | + | <syntaxhighlight lang="bash"> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
dmesg | grep -i psp | dmesg | grep -i psp | ||
− | + | </syntaxhighlight> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | --- | + | Follow community projects: |
+ | * [https://github.com/Cr4sh/psp-tool psp-tool (WIP)] | ||
+ | * [https://github.com/amd/blobs-openSIL openSIL (AMD's open firmware project)] | ||
− | + | == Recommended Tools == | |
− | + | * [https://flashrom.org/Flashrom flashrom] | |
− | + | * [https://github.com/corna/me_cleaner me_cleaner] | |
− | - | + | * [https://libreboot.org/ Libreboot] |
− | + | * [https://coreboot.org/status/board-status.html Coreboot Supported Boards] | |
− | -- | + | == Post-Cleanup OPSEC Practices == |
+ | * Use Qubes, Tails, or Whonix for ops | ||
+ | * Use air-gapped systems where possible | ||
+ | * Avoid fTPM/Secure Boot systems | ||
− | + | == Contributions == | |
+ | We welcome new methods to disable Yankee Daemons. Submit tools, firmware dumps, or testing results via pull request. | ||
− | + | ''"The boot ROM is the only God I fear."'' |
Revision as of 07:56, 21 April 2025
Pyongyang Night
"A thousand CPUs went dark before dawn."
Pyongyang Night is an open-source OPSEC hardening project focused on disabling known Western surveillance backdoors ("Yankee daemons") in Intel and AMD CPUs. This includes Intel ME, AMD PSP, fTPM, and associated firmware-based threats. It offers guides and tools to permanently neutralize these subsystems and restore sovereignty to your machines.
Table of Contents
- Overview
- Intel: Removing the Management Engine (ME)
- AMD: Disabling the Platform Security Processor (PSP)
- Recommended Tools
- Post-Cleanup OPSEC Practices
- Contributions
Overview
Modern x86 systems ship with embedded management controllers that run below the OS level. These controllers—Intel ME and AMD PSP—have unrestricted access to memory, peripherals, and network devices. They are proprietary, closed-source, and required for "Secure Boot" and other platform lockdown mechanisms.
Intel: Removing the Management Engine (ME)
Step 1: Check if your system is vulnerable
- Target systems: Intel platforms from 2008–2017 (Core 2 through Skylake/Kaby Lake)
- Look for ME version 6.x – 11.x
Step 2: Install dependencies: <syntaxhighlight lang="bash"> sudo apt install flashrom python3 git build-essential </syntaxhighlight>
Step 3: Dump firmware: <syntaxhighlight lang="bash"> flashrom -p internal -r backup.rom </syntaxhighlight>
Step 4: Clean ME using me_cleaner: <syntaxhighlight lang="bash"> git clone https://github.com/corna/me_cleaner.git cd me_cleaner python3 me_cleaner.py -S ../backup.rom -o cleaned.rom </syntaxhighlight>
Step 5: Flash cleaned firmware: <syntaxhighlight lang="bash"> flashrom -p internal -w cleaned.rom </syntaxhighlight>
AMD: Disabling the Platform Security Processor (PSP)
Step 1: Disable fTPM in BIOS Step 2: Disable Secure Boot Step 3: Monitor PSP activity (Linux): <syntaxhighlight lang="bash"> dmesg | grep -i psp </syntaxhighlight>
Follow community projects:
Recommended Tools
Post-Cleanup OPSEC Practices
- Use Qubes, Tails, or Whonix for ops
- Use air-gapped systems where possible
- Avoid fTPM/Secure Boot systems
Contributions
We welcome new methods to disable Yankee Daemons. Submit tools, firmware dumps, or testing results via pull request.
"The boot ROM is the only God I fear."