Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

Scheduled Pinned Locked Moved Uncategorized
36 Posts 27 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • kallisti@infosec.exchangeK kallisti@infosec.exchange

    @0xabad1dea

    How else would feds get the data of these pesky criminals?

    E This user is from outside of this forum
    E This user is from outside of this forum
    equity7804@hostux.social
    wrote last edited by
    #18

    @kallisti @0xabad1dea well by asking Microsoft nicely for the decryption keys they store in plain text among account data on their server of course 😵‍💫 (fck microsoft)

    1 Reply Last reply
    0
    • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

      RE: https://cyberplace.social/@GossiTheDog/116565662607962457

      The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

      The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

      rrb@infosec.exchangeR This user is from outside of this forum
      rrb@infosec.exchangeR This user is from outside of this forum
      rrb@infosec.exchange
      wrote last edited by
      #19

      @0xabad1dea To be honest, I had a Huawei phone for a long time, because I trust the human rights record of the PRC more than I trust the US tech companies.

      energisch_@troet.cafeE 1 Reply Last reply
      1
      0
      • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

        RE: https://cyberplace.social/@GossiTheDog/116565662607962457

        The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

        The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

        energisch_@troet.cafeE This user is from outside of this forum
        energisch_@troet.cafeE This user is from outside of this forum
        energisch_@troet.cafe
        wrote last edited by
        #20

        @0xabad1dea MS has been known - from the start with their first windows versions that they distribute beta versions that come with bugs galore. The user/customer then hands in all those problematic situations which (with luck) get repaired and updated every other day. Those repair updates will happen as long as the version is distributed and only stop when there is a new and "better" version... again, of course, beta, full of bugs.
        Microsoft customers are used to being used as beta testers.

        1 Reply Last reply
        0
        • rrb@infosec.exchangeR rrb@infosec.exchange

          @0xabad1dea To be honest, I had a Huawei phone for a long time, because I trust the human rights record of the PRC more than I trust the US tech companies.

          energisch_@troet.cafeE This user is from outside of this forum
          energisch_@troet.cafeE This user is from outside of this forum
          energisch_@troet.cafe
          wrote last edited by
          #21

          @rrb Well you got a point there. At least it wouldn't be worse than a US tech phone @0xabad1dea

          rrb@infosec.exchangeR 1 Reply Last reply
          0
          • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

            RE: https://cyberplace.social/@GossiTheDog/116565662607962457

            The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

            The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

            capnthommo@c.imC This user is from outside of this forum
            capnthommo@c.imC This user is from outside of this forum
            capnthommo@c.im
            wrote last edited by
            #22

            @0xabad1dea oh I'm sure if was the merest accidental oversight and that they're very very sorry and feel so foolish now.😉

            1 Reply Last reply
            0
            • energisch_@troet.cafeE energisch_@troet.cafe

              @rrb Well you got a point there. At least it wouldn't be worse than a US tech phone @0xabad1dea

              rrb@infosec.exchangeR This user is from outside of this forum
              rrb@infosec.exchangeR This user is from outside of this forum
              rrb@infosec.exchange
              wrote last edited by
              #23

              @energisch_ @0xabad1dea and I don't live in China, so their ability to mess with me is limited

              energisch_@troet.cafeE 1 Reply Last reply
              0
              • rrb@infosec.exchangeR rrb@infosec.exchange

                @energisch_ @0xabad1dea and I don't live in China, so their ability to mess with me is limited

                energisch_@troet.cafeE This user is from outside of this forum
                energisch_@troet.cafeE This user is from outside of this forum
                energisch_@troet.cafe
                wrote last edited by
                #24

                @rrb exactly! @0xabad1dea

                rrb@infosec.exchangeR 1 Reply Last reply
                0
                • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                  RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                  The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                  The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                  pa27@mastodon.socialP This user is from outside of this forum
                  pa27@mastodon.socialP This user is from outside of this forum
                  pa27@mastodon.social
                  wrote last edited by
                  #25

                  @0xabad1dea Kind of ironic that this is posted on github!!

                  0xabad1dea@infosec.exchange0 1 Reply Last reply
                  0
                  • pa27@mastodon.socialP pa27@mastodon.social

                    @0xabad1dea Kind of ironic that this is posted on github!!

                    0xabad1dea@infosec.exchange0 This user is from outside of this forum
                    0xabad1dea@infosec.exchange0 This user is from outside of this forum
                    0xabad1dea@infosec.exchange
                    wrote last edited by
                    #26

                    @pa27 that's why I was quick to download it 😂

                    1 Reply Last reply
                    0
                    • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                      RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                      The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                      The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                      crazyeddie@mastodon.socialC This user is from outside of this forum
                      crazyeddie@mastodon.socialC This user is from outside of this forum
                      crazyeddie@mastodon.social
                      wrote last edited by
                      #27

                      @0xabad1dea How did they come by the content of these files?

                      1 Reply Last reply
                      0
                      • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                        RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                        The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                        The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                        jernej__s@infosec.exchangeJ This user is from outside of this forum
                        jernej__s@infosec.exchangeJ This user is from outside of this forum
                        jernej__s@infosec.exchange
                        wrote last edited by
                        #28

                        @0xabad1dea There's also about 20 MB of other files.

                        0xabad1dea@infosec.exchange0 1 Reply Last reply
                        0
                        • jernej__s@infosec.exchangeJ jernej__s@infosec.exchange

                          @0xabad1dea There's also about 20 MB of other files.

                          0xabad1dea@infosec.exchange0 This user is from outside of this forum
                          0xabad1dea@infosec.exchange0 This user is from outside of this forum
                          0xabad1dea@infosec.exchange
                          wrote last edited by
                          #29

                          @jernej__s they're just empty log files (a header plus megabytes of zeroes), presumably because if they're missing entirely, something errors out before the flag gets processed

                          jernej__s@infosec.exchangeJ 1 Reply Last reply
                          0
                          • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                            RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                            The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                            The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                            shana@mastodon.gamedev.placeS This user is from outside of this forum
                            shana@mastodon.gamedev.placeS This user is from outside of this forum
                            shana@mastodon.gamedev.place
                            wrote last edited by
                            #30

                            @0xabad1dea

                            1 Reply Last reply
                            0
                            • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                              RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                              The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                              The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                              glitchy404@wetdry.worldG This user is from outside of this forum
                              glitchy404@wetdry.worldG This user is from outside of this forum
                              glitchy404@wetdry.world
                              wrote last edited by
                              #31

                              @0xabad1dea

                              Also for whatever reason, only windows 11 (+Server 2022/2025) are affect, windows 10 is not.
                              another win 10 w!!!!!!!!!!!!!!!!

                              1 Reply Last reply
                              0
                              • energisch_@troet.cafeE energisch_@troet.cafe

                                @rrb exactly! @0xabad1dea

                                rrb@infosec.exchangeR This user is from outside of this forum
                                rrb@infosec.exchangeR This user is from outside of this forum
                                rrb@infosec.exchange
                                wrote last edited by
                                #32

                                @energisch_ @0xabad1dea And this is unrelated to a former student of mine working on security for Huawei, because another student is managing security for Microsoft

                                1 Reply Last reply
                                1
                                0
                                • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                                  RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                                  The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                                  The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                                  slyborg@vmst.ioS This user is from outside of this forum
                                  slyborg@vmst.ioS This user is from outside of this forum
                                  slyborg@vmst.io
                                  wrote last edited by
                                  #33

                                  @0xabad1dea I feel certain that FileVault also has some kind of magic bypass. Either of the ‘haha nobody will ever discover the arcane incantation needed to put this developer test mode’ or more likely requested by a three letter agency.

                                  1 Reply Last reply
                                  0
                                  • oilheap@infosec.exchangeO oilheap@infosec.exchange

                                    @0xabad1dea this is what you get when you do disk encryption without user input 🤷

                                    babble_endanger@freeradical.zoneB This user is from outside of this forum
                                    babble_endanger@freeradical.zoneB This user is from outside of this forum
                                    babble_endanger@freeradical.zone
                                    wrote last edited by
                                    #34

                                    @oilheap @0xabad1dea yeah i was wondering that... So this exploit only works if you don't use a password or pin?

                                    0xabad1dea@infosec.exchange0 1 Reply Last reply
                                    0
                                    • babble_endanger@freeradical.zoneB babble_endanger@freeradical.zone

                                      @oilheap @0xabad1dea yeah i was wondering that... So this exploit only works if you don't use a password or pin?

                                      0xabad1dea@infosec.exchange0 This user is from outside of this forum
                                      0xabad1dea@infosec.exchange0 This user is from outside of this forum
                                      0xabad1dea@infosec.exchange
                                      wrote last edited by
                                      #35

                                      @babble_endanger @oilheap if you have a password on bitlocker itself (as opposed to your Windows account) then yes, this debug backdoor cannot work.

                                      1 Reply Last reply
                                      0
                                      • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                                        @jernej__s they're just empty log files (a header plus megabytes of zeroes), presumably because if they're missing entirely, something errors out before the flag gets processed

                                        jernej__s@infosec.exchangeJ This user is from outside of this forum
                                        jernej__s@infosec.exchangeJ This user is from outside of this forum
                                        jernej__s@infosec.exchange
                                        wrote last edited by
                                        #36

                                        @0xabad1dea Looks like one of the files causes winpeshl.ini on the ramdrive to be deleted, which eventually results in command prompt to be spawned instead of the usual UI.

                                        1 Reply Last reply
                                        1
                                        0
                                        Reply
                                        • Reply as topic
                                        Log in to reply
                                        • Oldest to Newest
                                        • Newest to Oldest
                                        • Most Votes


                                        • Login

                                        • Login or register to search.
                                        • First post
                                          Last post
                                        0
                                        • Categories
                                        • Recent
                                        • Tags
                                        • Popular
                                        • World
                                        • Users
                                        • Groups