<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey.]]></title><description><![CDATA[<p>Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey.</p><p>TL;DR: </p><ul><li>GreenPlasma looks interesting, but it's not a complete exploit. It's at best a building block toward LPE on Windows.</li><li>YellowKey is a Windows login bypass for an attacker with physical access. Use case: Your roomate wants to get into your roomate's  poorly protected (potentially work-owned) laptop. Mitigation: Use Bitlocker with a PIN. (Note: The YellowKey author <a href="https://deadeclipse666.blogspot.com/2026/05/were-doing-silent-patches-now-huh-also.html" rel="nofollow noopener">disagrees that PIN is a protection</a> <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f914.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--thinking_face" style="height:23px;width:auto;vertical-align:middle" title="🤔" alt="🤔" />)</li></ul><p>1) <a href="https://github.com/Nightmare-Eclipse/GreenPlasma" rel="nofollow noopener">GreenPlasma</a><br />Here , an unprivileged user can create an arbitrary memory section in an object.  While the first time I tried it it hung at the UAC prompt, but subsequent attempts worked to go from low-privileged to creating a <code>\CSRSS_TEST_SECTION</code> object.<br />It is worth noting that the PoC as it is does <strong>not</strong> have the bits that would turn it into a true LPE, as that is left as an exercise to the user.</p><p>2) <a href="https://github.com/Nightmare-Eclipse/YellowKey" rel="nofollow noopener">YellowKey</a><br />This one is a bit hand-wavy to me, But I eventually was able to reproduce it. Via an attached USB drive. I could <strong>NOT</strong> reproduce it via putting the <code>FsTx</code> directory on the EFI partition. Potentially because the <code>FsTx</code> replay happened before my triggering of Recovery. I <strong>was</strong> able to reproduce with a USB drive attached.</p><p>The target is a TPM-only bitlocker, which is known to be insecure. The use case is that, with physical access, you can access the filesystem with root privileges. Which even TPM-only bitlocker would prevent.</p><p>There is a <a href="https://nitter.net/weezerOSINT/status/2054299771817660433" rel="nofollow noopener">thread on Twitter</a> that claims to have reverse engineered the YellowKey Bitlocker bypass.  And it talks about <code>RecoverySimulation.ini</code> and how it skips <strong>re</strong>-locking a bitlocker drive.  The thing about this is:<br />1) This <code>RecoverySimulation.ini</code> stuff was <a href="https://patchmypc.com/blog/quick-machine-recovery-windows/" rel="nofollow noopener">talked about publicly last year</a><br />2) The actual bits in the YellowKey GitHub repo are the contents of an <code>FsTx</code> directory.  Which appears to be be related to <a href="https://learn.microsoft.com/en-us/windows/win32/fileio/transactional-ntfs-portal" rel="nofollow noopener">Transactional NTFS</a>, which uses CLFS under the hood.  (The files parse with python's <code>dissect.clfs</code>).  Also note that by looking at Windows' <code>fstx.dll</code>, we can see code that explicitly looks for <code>\System Volume Information\FsTx</code> in the <code>FsTxFindSessions()</code> function.</p><p>Microsoft themselves have <a href="https://learn.microsoft.com/en-us/windows/win32/fileio/deprecation-of-txf" rel="nofollow noopener">this to say</a> about TxF <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f602.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--joy" style="height:23px;width:auto;vertical-align:middle" title="😂" alt="😂" />:</p><blockquote><p>While TxF is a powerful set of APIs, there has been extremely limited developer interest in this API platform since Windows Vista primarily due to its complexity and various nuances which developers need to consider as part of application development. As a result, Microsoft is considering deprecating TxF APIs in a future version of Windows to focus development and maintenance efforts on other features and APIs which have more value to a larger majority of customers.</p></blockquote><p>And if one looks at the contents of this <code>FsTx</code> directory in the GitHub repo, there are no strings related to <code>RecoverySimulation.ini</code> in it at all.  Only of interest is perhaps:<br /><code>\??\C:\Windows\win.ini</code><br />and<br /><code>\??\X:\Windows\System32\winpeshl.ini</code></p><p>Where <code>X:\Windows\System32\winpeshl.ini</code> is what controls what WinRE does when it fires up.</p><p>But anyway, yes it works.<br />But what's intriguing to me is: Why can the presence a <code>\System Volume Information\FsTx</code> directory on one volume affect the contents of <strong>ANOTHER VOLUME</strong> when it's replayed?  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f914.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--thinking_face" style="height:23px;width:auto;vertical-align:middle" title="🤔" alt="🤔" /></p><p>In a normal WinRE session, you have a <code>X:\Windows\System32</code> directory that has a <code>winpeshl.ini</code> file in it:</p><pre><code>[LaunchApp]<br />AppPath=X:\sources\recovery\recenv.exe<br /></code></pre><p>However, with the YellowKey exploit, it looks like Transactional NTFS bits on a <strong>USB Drive</strong> are able to delete the <code>winpeshl.ini</code> file on <strong>ANOTHER DRIVE</strong> (<code>X:</code>).  And we get a cmd.exe prompt, with bitlocker unlocked instead of the expected Windows Recovery environment.  While the TPM-only Bitlocker bypass is indeed interesting, I think the buried lede here is that a <code>\System Volume Information\FsTx</code> directory on one volume has the ability to modify the contents of <strong>another volume</strong> when it is replayed.  To me, this in and of itself sounds like a vulnerability.</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/565/127/014/389/939/original/0a88d526273c394e.png" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/567/494/807/329/117/original/f6d86c72edcb3fb8.png" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/567/620/557/770/673/original/66f5932d7940c7c9.png" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/567/721/191/448/507/original/a9cba8e04b826411.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/497c6c7d-9d47-403d-9e95-d4ef04bb4310/nightmare-eclipse-has-published-two-new-toys-to-github-greenplasma-and-yellowkey.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 05:37:36 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/497c6c7d-9d47-403d-9e95-d4ef04bb4310.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 03:25:28 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey. on Thu, 14 May 2026 17:57:39 GMT]]></title><description><![CDATA[<p>Note that I've found the <code>hold CRTL and do NOT lift your finger off it</code> part of YellowKey to be completely unnecessary.</p><p>From the beginning, I wondered <strong>why</strong> that was even part of the instructions (what does it accomplish?).  And I guess the answer to that question is: Nothing?<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f937.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--shrug" style="height:23px;width:auto;vertical-align:middle" title="🤷" alt="🤷" />‍<img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2642.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--male_sign" style="height:23px;width:auto;vertical-align:middle" title="♂" alt="♂" />️</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116574221708471685</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116574221708471685</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Thu, 14 May 2026 17:57:39 GMT</pubDate></item><item><title><![CDATA[Reply to Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey. on Thu, 14 May 2026 05:40:18 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span>,</p><p>P.S.</p><p>&gt; The YellowKey author disagrees that PIN is a protection</p><p>Since early WinRE bypasses, Microsoft treats the "my PIN is known to the attacker, in the TPM+PIN configuration" situation as within the threat model. (IMO, this is not 2FA with one factor known to the attacker, but something similar.)</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/errno_fail/statuses/116571322359022726</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/errno_fail/statuses/116571322359022726</guid><dc:creator><![CDATA[errno_fail@infosec.exchange]]></dc:creator><pubDate>Thu, 14 May 2026 05:40:18 GMT</pubDate></item><item><title><![CDATA[Reply to Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey. on Wed, 13 May 2026 23:14:34 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> "While TxF is a powerful set of APIs, there has been extremely limited developer interest in this API platform since Windows Vista primarily due to its complexity and various nuances which developers need to consider as part of application development. As a result, Microsoft is considering deprecating TxF APIs in a future version of Windows..." Wonder what "nuances" means here?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/bismilla/statuses/116569805596232560</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/bismilla/statuses/116569805596232560</guid><dc:creator><![CDATA[bismilla@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 23:14:34 GMT</pubDate></item><item><title><![CDATA[Reply to Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey. on Wed, 13 May 2026 20:30:43 GMT]]></title><description><![CDATA[<p><span><a href="/user/jernej__s%40infosec.exchange">@<span>jernej__s</span></a></span> <span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> </p><p>Worked fine here. If the backdoor works you habe an open system shell before any menue. You can than use diskpart to mount the internal drive</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/cakruege/statuses/116569161309854677</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/cakruege/statuses/116569161309854677</guid><dc:creator><![CDATA[cakruege@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 20:30:43 GMT</pubDate></item><item><title><![CDATA[Reply to Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey. on Wed, 13 May 2026 13:54:02 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> YellowKey works fine on my laptop – copied the FsTx folder to System Volume Information directory on my sysresccd USB drive (2GB FAT32), Shift+restart, held Ctrl until recovery environment booted to command prompt. Unlocked <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f604.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--smile" style="height:23px;width:auto;vertical-align:middle" title="C:" alt="😄" /> partition, predictably did not unlock D:.</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/567/595/699/609/097/original/b1022902b449013d.jpg" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/567/596/301/091/649/original/9f75c3c72bb7fb7e.jpg" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/jernej__s/statuses/116567601491522459</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/jernej__s/statuses/116567601491522459</guid><dc:creator><![CDATA[jernej__s@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 13:54:02 GMT</pubDate></item><item><title><![CDATA[Reply to Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey. on Wed, 13 May 2026 09:34:05 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span>, these bypasses are very close to login/lock screen bypasses (after the usual boot) and kiosk mode escapes (in WinRE).</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/errno_fail/statuses/116566579341571612</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/errno_fail/statuses/116566579341571612</guid><dc:creator><![CDATA[errno_fail@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 09:34:05 GMT</pubDate></item><item><title><![CDATA[Reply to Nightmare-Eclipse has published two new toys to GitHub: GreenPlasma and YellowKey. on Wed, 13 May 2026 09:30:15 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span>,</p><p>&gt; TPM-only bitlocker is known to not be very secure, and if you have TPM+PIN, then you can't get to Windows Recovery Environment Agent without the PIN.  So again, where's the bypass?</p><p>The TPM-only mode works well to lock employees out of their corporate laptops (users can't mount the drive on another computer or in another OS using a user password) and with no requirement to create another strong password.</p><p>Also, all WinRE bypasses affect the TPM plus Network Key mode (seamless boot when the computer is in the trusted wired network: both the network server and TPM unwrap the encryption key).</p><p>---</p><p>It's interesting that Microsoft disguises some vulnerability descriptions as EoP, not as SfB.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/errno_fail/statuses/116566564242476739</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/errno_fail/statuses/116566564242476739</guid><dc:creator><![CDATA[errno_fail@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 09:30:15 GMT</pubDate></item></channel></rss>