Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

Scheduled Pinned Locked Moved Uncategorized
36 Posts 27 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

    RE: https://cyberplace.social/@GossiTheDog/116565662607962457

    The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

    The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

    capnthommo@c.imC This user is from outside of this forum
    capnthommo@c.imC This user is from outside of this forum
    capnthommo@c.im
    wrote last edited by
    #22

    @0xabad1dea oh I'm sure if was the merest accidental oversight and that they're very very sorry and feel so foolish now.😉

    1 Reply Last reply
    0
    • energisch_@troet.cafeE energisch_@troet.cafe

      @rrb Well you got a point there. At least it wouldn't be worse than a US tech phone @0xabad1dea

      rrb@infosec.exchangeR This user is from outside of this forum
      rrb@infosec.exchangeR This user is from outside of this forum
      rrb@infosec.exchange
      wrote last edited by
      #23

      @energisch_ @0xabad1dea and I don't live in China, so their ability to mess with me is limited

      energisch_@troet.cafeE 1 Reply Last reply
      0
      • rrb@infosec.exchangeR rrb@infosec.exchange

        @energisch_ @0xabad1dea and I don't live in China, so their ability to mess with me is limited

        energisch_@troet.cafeE This user is from outside of this forum
        energisch_@troet.cafeE This user is from outside of this forum
        energisch_@troet.cafe
        wrote last edited by
        #24

        @rrb exactly! @0xabad1dea

        rrb@infosec.exchangeR 1 Reply Last reply
        0
        • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

          RE: https://cyberplace.social/@GossiTheDog/116565662607962457

          The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

          The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

          pa27@mastodon.socialP This user is from outside of this forum
          pa27@mastodon.socialP This user is from outside of this forum
          pa27@mastodon.social
          wrote last edited by
          #25

          @0xabad1dea Kind of ironic that this is posted on github!!

          0xabad1dea@infosec.exchange0 1 Reply Last reply
          0
          • pa27@mastodon.socialP pa27@mastodon.social

            @0xabad1dea Kind of ironic that this is posted on github!!

            0xabad1dea@infosec.exchange0 This user is from outside of this forum
            0xabad1dea@infosec.exchange0 This user is from outside of this forum
            0xabad1dea@infosec.exchange
            wrote last edited by
            #26

            @pa27 that's why I was quick to download it 😂

            1 Reply Last reply
            0
            • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

              RE: https://cyberplace.social/@GossiTheDog/116565662607962457

              The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

              The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

              crazyeddie@mastodon.socialC This user is from outside of this forum
              crazyeddie@mastodon.socialC This user is from outside of this forum
              crazyeddie@mastodon.social
              wrote last edited by
              #27

              @0xabad1dea How did they come by the content of these files?

              1 Reply Last reply
              0
              • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                jernej__s@infosec.exchangeJ This user is from outside of this forum
                jernej__s@infosec.exchangeJ This user is from outside of this forum
                jernej__s@infosec.exchange
                wrote last edited by
                #28

                @0xabad1dea There's also about 20 MB of other files.

                0xabad1dea@infosec.exchange0 1 Reply Last reply
                0
                • jernej__s@infosec.exchangeJ jernej__s@infosec.exchange

                  @0xabad1dea There's also about 20 MB of other files.

                  0xabad1dea@infosec.exchange0 This user is from outside of this forum
                  0xabad1dea@infosec.exchange0 This user is from outside of this forum
                  0xabad1dea@infosec.exchange
                  wrote last edited by
                  #29

                  @jernej__s they're just empty log files (a header plus megabytes of zeroes), presumably because if they're missing entirely, something errors out before the flag gets processed

                  jernej__s@infosec.exchangeJ 1 Reply Last reply
                  0
                  • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                    RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                    The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                    The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                    shana@mastodon.gamedev.placeS This user is from outside of this forum
                    shana@mastodon.gamedev.placeS This user is from outside of this forum
                    shana@mastodon.gamedev.place
                    wrote last edited by
                    #30

                    @0xabad1dea

                    1 Reply Last reply
                    0
                    • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                      RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                      The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                      The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                      glitchy404@wetdry.worldG This user is from outside of this forum
                      glitchy404@wetdry.worldG This user is from outside of this forum
                      glitchy404@wetdry.world
                      wrote last edited by
                      #31

                      @0xabad1dea

                      Also for whatever reason, only windows 11 (+Server 2022/2025) are affect, windows 10 is not.
                      another win 10 w!!!!!!!!!!!!!!!!

                      1 Reply Last reply
                      0
                      • energisch_@troet.cafeE energisch_@troet.cafe

                        @rrb exactly! @0xabad1dea

                        rrb@infosec.exchangeR This user is from outside of this forum
                        rrb@infosec.exchangeR This user is from outside of this forum
                        rrb@infosec.exchange
                        wrote last edited by
                        #32

                        @energisch_ @0xabad1dea And this is unrelated to a former student of mine working on security for Huawei, because another student is managing security for Microsoft

                        1 Reply Last reply
                        1
                        0
                        • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                          RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                          The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                          The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                          slyborg@vmst.ioS This user is from outside of this forum
                          slyborg@vmst.ioS This user is from outside of this forum
                          slyborg@vmst.io
                          wrote last edited by
                          #33

                          @0xabad1dea I feel certain that FileVault also has some kind of magic bypass. Either of the ‘haha nobody will ever discover the arcane incantation needed to put this developer test mode’ or more likely requested by a three letter agency.

                          1 Reply Last reply
                          0
                          • oilheap@infosec.exchangeO oilheap@infosec.exchange

                            @0xabad1dea this is what you get when you do disk encryption without user input 🤷

                            babble_endanger@freeradical.zoneB This user is from outside of this forum
                            babble_endanger@freeradical.zoneB This user is from outside of this forum
                            babble_endanger@freeradical.zone
                            wrote last edited by
                            #34

                            @oilheap @0xabad1dea yeah i was wondering that... So this exploit only works if you don't use a password or pin?

                            0xabad1dea@infosec.exchange0 1 Reply Last reply
                            0
                            • babble_endanger@freeradical.zoneB babble_endanger@freeradical.zone

                              @oilheap @0xabad1dea yeah i was wondering that... So this exploit only works if you don't use a password or pin?

                              0xabad1dea@infosec.exchange0 This user is from outside of this forum
                              0xabad1dea@infosec.exchange0 This user is from outside of this forum
                              0xabad1dea@infosec.exchange
                              wrote last edited by
                              #35

                              @babble_endanger @oilheap if you have a password on bitlocker itself (as opposed to your Windows account) then yes, this debug backdoor cannot work.

                              1 Reply Last reply
                              0
                              • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                                @jernej__s they're just empty log files (a header plus megabytes of zeroes), presumably because if they're missing entirely, something errors out before the flag gets processed

                                jernej__s@infosec.exchangeJ This user is from outside of this forum
                                jernej__s@infosec.exchangeJ This user is from outside of this forum
                                jernej__s@infosec.exchange
                                wrote last edited by
                                #36

                                @0xabad1dea Looks like one of the files causes winpeshl.ini on the ramdrive to be deleted, which eventually results in command prompt to be spawned instead of the usual UI.

                                1 Reply Last reply
                                1
                                0
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups