Behind each page that we navigate, mail that we send, cloud that we visit, there is a small and dark microprocessor listening, monitoring and waiting for the moment to do a hard reset. What is it? How he thinks? And above all, how can we hack it? Welcome to the world of IPMI and out of management networks. Through this paper we will seek to understand the risks, the surfaces of attack and the different vulnerabilities that these devices present and to understand how far we can go, once they have been compromised.