Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

Scheduled Pinned Locked Moved Uncategorized
36 Posts 27 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rrb@infosec.exchangeR rrb@infosec.exchange

    @0xabad1dea To be honest, I had a Huawei phone for a long time, because I trust the human rights record of the PRC more than I trust the US tech companies.

    energisch_@troet.cafeE This user is from outside of this forum
    energisch_@troet.cafeE This user is from outside of this forum
    energisch_@troet.cafe
    wrote last edited by
    #21

    @rrb Well you got a point there. At least it wouldn't be worse than a US tech phone @0xabad1dea

    rrb@infosec.exchangeR 1 Reply Last reply
    0
    • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

      RE: https://cyberplace.social/@GossiTheDog/116565662607962457

      The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

      The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

      capnthommo@c.imC This user is from outside of this forum
      capnthommo@c.imC This user is from outside of this forum
      capnthommo@c.im
      wrote last edited by
      #22

      @0xabad1dea oh I'm sure if was the merest accidental oversight and that they're very very sorry and feel so foolish now.😉

      1 Reply Last reply
      0
      • energisch_@troet.cafeE energisch_@troet.cafe

        @rrb Well you got a point there. At least it wouldn't be worse than a US tech phone @0xabad1dea

        rrb@infosec.exchangeR This user is from outside of this forum
        rrb@infosec.exchangeR This user is from outside of this forum
        rrb@infosec.exchange
        wrote last edited by
        #23

        @energisch_ @0xabad1dea and I don't live in China, so their ability to mess with me is limited

        energisch_@troet.cafeE 1 Reply Last reply
        0
        • rrb@infosec.exchangeR rrb@infosec.exchange

          @energisch_ @0xabad1dea and I don't live in China, so their ability to mess with me is limited

          energisch_@troet.cafeE This user is from outside of this forum
          energisch_@troet.cafeE This user is from outside of this forum
          energisch_@troet.cafe
          wrote last edited by
          #24

          @rrb exactly! @0xabad1dea

          rrb@infosec.exchangeR 1 Reply Last reply
          0
          • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

            RE: https://cyberplace.social/@GossiTheDog/116565662607962457

            The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

            The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

            pa27@mastodon.socialP This user is from outside of this forum
            pa27@mastodon.socialP This user is from outside of this forum
            pa27@mastodon.social
            wrote last edited by
            #25

            @0xabad1dea Kind of ironic that this is posted on github!!

            0xabad1dea@infosec.exchange0 1 Reply Last reply
            0
            • pa27@mastodon.socialP pa27@mastodon.social

              @0xabad1dea Kind of ironic that this is posted on github!!

              0xabad1dea@infosec.exchange0 This user is from outside of this forum
              0xabad1dea@infosec.exchange0 This user is from outside of this forum
              0xabad1dea@infosec.exchange
              wrote last edited by
              #26

              @pa27 that's why I was quick to download it 😂

              1 Reply Last reply
              0
              • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                crazyeddie@mastodon.socialC This user is from outside of this forum
                crazyeddie@mastodon.socialC This user is from outside of this forum
                crazyeddie@mastodon.social
                wrote last edited by
                #27

                @0xabad1dea How did they come by the content of these files?

                1 Reply Last reply
                0
                • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                  RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                  The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                  The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                  jernej__s@infosec.exchangeJ This user is from outside of this forum
                  jernej__s@infosec.exchangeJ This user is from outside of this forum
                  jernej__s@infosec.exchange
                  wrote last edited by
                  #28

                  @0xabad1dea There's also about 20 MB of other files.

                  0xabad1dea@infosec.exchange0 1 Reply Last reply
                  0
                  • jernej__s@infosec.exchangeJ jernej__s@infosec.exchange

                    @0xabad1dea There's also about 20 MB of other files.

                    0xabad1dea@infosec.exchange0 This user is from outside of this forum
                    0xabad1dea@infosec.exchange0 This user is from outside of this forum
                    0xabad1dea@infosec.exchange
                    wrote last edited by
                    #29

                    @jernej__s they're just empty log files (a header plus megabytes of zeroes), presumably because if they're missing entirely, something errors out before the flag gets processed

                    jernej__s@infosec.exchangeJ 1 Reply Last reply
                    0
                    • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                      RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                      The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                      The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                      shana@mastodon.gamedev.placeS This user is from outside of this forum
                      shana@mastodon.gamedev.placeS This user is from outside of this forum
                      shana@mastodon.gamedev.place
                      wrote last edited by
                      #30

                      @0xabad1dea

                      1 Reply Last reply
                      0
                      • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                        RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                        The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                        The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                        glitchy404@wetdry.worldG This user is from outside of this forum
                        glitchy404@wetdry.worldG This user is from outside of this forum
                        glitchy404@wetdry.world
                        wrote last edited by
                        #31

                        @0xabad1dea

                        Also for whatever reason, only windows 11 (+Server 2022/2025) are affect, windows 10 is not.
                        another win 10 w!!!!!!!!!!!!!!!!

                        1 Reply Last reply
                        0
                        • energisch_@troet.cafeE energisch_@troet.cafe

                          @rrb exactly! @0xabad1dea

                          rrb@infosec.exchangeR This user is from outside of this forum
                          rrb@infosec.exchangeR This user is from outside of this forum
                          rrb@infosec.exchange
                          wrote last edited by
                          #32

                          @energisch_ @0xabad1dea And this is unrelated to a former student of mine working on security for Huawei, because another student is managing security for Microsoft

                          1 Reply Last reply
                          1
                          0
                          • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                            RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                            The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                            The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                            slyborg@vmst.ioS This user is from outside of this forum
                            slyborg@vmst.ioS This user is from outside of this forum
                            slyborg@vmst.io
                            wrote last edited by
                            #33

                            @0xabad1dea I feel certain that FileVault also has some kind of magic bypass. Either of the ‘haha nobody will ever discover the arcane incantation needed to put this developer test mode’ or more likely requested by a three letter agency.

                            1 Reply Last reply
                            0
                            • oilheap@infosec.exchangeO oilheap@infosec.exchange

                              @0xabad1dea this is what you get when you do disk encryption without user input 🤷

                              babble_endanger@freeradical.zoneB This user is from outside of this forum
                              babble_endanger@freeradical.zoneB This user is from outside of this forum
                              babble_endanger@freeradical.zone
                              wrote last edited by
                              #34

                              @oilheap @0xabad1dea yeah i was wondering that... So this exploit only works if you don't use a password or pin?

                              0xabad1dea@infosec.exchange0 1 Reply Last reply
                              0
                              • babble_endanger@freeradical.zoneB babble_endanger@freeradical.zone

                                @oilheap @0xabad1dea yeah i was wondering that... So this exploit only works if you don't use a password or pin?

                                0xabad1dea@infosec.exchange0 This user is from outside of this forum
                                0xabad1dea@infosec.exchange0 This user is from outside of this forum
                                0xabad1dea@infosec.exchange
                                wrote last edited by
                                #35

                                @babble_endanger @oilheap if you have a password on bitlocker itself (as opposed to your Windows account) then yes, this debug backdoor cannot work.

                                1 Reply Last reply
                                0
                                • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                                  @jernej__s they're just empty log files (a header plus megabytes of zeroes), presumably because if they're missing entirely, something errors out before the flag gets processed

                                  jernej__s@infosec.exchangeJ This user is from outside of this forum
                                  jernej__s@infosec.exchangeJ This user is from outside of this forum
                                  jernej__s@infosec.exchange
                                  wrote last edited by
                                  #36

                                  @0xabad1dea Looks like one of the files causes winpeshl.ini on the ramdrive to be deleted, which eventually results in command prompt to be spawned instead of the usual UI.

                                  1 Reply Last reply
                                  1
                                  0
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups