Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

Scheduled Pinned Locked Moved Uncategorized
36 Posts 27 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

    RE: https://cyberplace.social/@GossiTheDog/116565662607962457

    The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

    The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

    crazyeddie@mastodon.socialC This user is from outside of this forum
    crazyeddie@mastodon.socialC This user is from outside of this forum
    crazyeddie@mastodon.social
    wrote last edited by
    #27

    @0xabad1dea How did they come by the content of these files?

    1 Reply Last reply
    0
    • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

      RE: https://cyberplace.social/@GossiTheDog/116565662607962457

      The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

      The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

      jernej__s@infosec.exchangeJ This user is from outside of this forum
      jernej__s@infosec.exchangeJ This user is from outside of this forum
      jernej__s@infosec.exchange
      wrote last edited by
      #28

      @0xabad1dea There's also about 20 MB of other files.

      0xabad1dea@infosec.exchange0 1 Reply Last reply
      0
      • jernej__s@infosec.exchangeJ jernej__s@infosec.exchange

        @0xabad1dea There's also about 20 MB of other files.

        0xabad1dea@infosec.exchange0 This user is from outside of this forum
        0xabad1dea@infosec.exchange0 This user is from outside of this forum
        0xabad1dea@infosec.exchange
        wrote last edited by
        #29

        @jernej__s they're just empty log files (a header plus megabytes of zeroes), presumably because if they're missing entirely, something errors out before the flag gets processed

        jernej__s@infosec.exchangeJ 1 Reply Last reply
        0
        • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

          RE: https://cyberplace.social/@GossiTheDog/116565662607962457

          The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

          The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

          shana@mastodon.gamedev.placeS This user is from outside of this forum
          shana@mastodon.gamedev.placeS This user is from outside of this forum
          shana@mastodon.gamedev.place
          wrote last edited by
          #30

          @0xabad1dea

          1 Reply Last reply
          0
          • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

            RE: https://cyberplace.social/@GossiTheDog/116565662607962457

            The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

            The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

            glitchy404@wetdry.worldG This user is from outside of this forum
            glitchy404@wetdry.worldG This user is from outside of this forum
            glitchy404@wetdry.world
            wrote last edited by
            #31

            @0xabad1dea

            Also for whatever reason, only windows 11 (+Server 2022/2025) are affect, windows 10 is not.
            another win 10 w!!!!!!!!!!!!!!!!

            1 Reply Last reply
            0
            • energisch_@troet.cafeE energisch_@troet.cafe

              @rrb exactly! @0xabad1dea

              rrb@infosec.exchangeR This user is from outside of this forum
              rrb@infosec.exchangeR This user is from outside of this forum
              rrb@infosec.exchange
              wrote last edited by
              #32

              @energisch_ @0xabad1dea And this is unrelated to a former student of mine working on security for Huawei, because another student is managing security for Microsoft

              1 Reply Last reply
              1
              0
              • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                RE: https://cyberplace.social/@GossiTheDog/116565662607962457

                The chill I got when I downloaded the repo and realized the “exploit” was a zero byte file with a magic filename…

                The charitable interpretation is that Microsoft accidentally shipped an internal test build to global production. The less charitable one isn’t very pleasant

                slyborg@vmst.ioS This user is from outside of this forum
                slyborg@vmst.ioS This user is from outside of this forum
                slyborg@vmst.io
                wrote last edited by
                #33

                @0xabad1dea I feel certain that FileVault also has some kind of magic bypass. Either of the ‘haha nobody will ever discover the arcane incantation needed to put this developer test mode’ or more likely requested by a three letter agency.

                1 Reply Last reply
                0
                • oilheap@infosec.exchangeO oilheap@infosec.exchange

                  @0xabad1dea this is what you get when you do disk encryption without user input 🤷

                  babble_endanger@freeradical.zoneB This user is from outside of this forum
                  babble_endanger@freeradical.zoneB This user is from outside of this forum
                  babble_endanger@freeradical.zone
                  wrote last edited by
                  #34

                  @oilheap @0xabad1dea yeah i was wondering that... So this exploit only works if you don't use a password or pin?

                  0xabad1dea@infosec.exchange0 1 Reply Last reply
                  0
                  • babble_endanger@freeradical.zoneB babble_endanger@freeradical.zone

                    @oilheap @0xabad1dea yeah i was wondering that... So this exploit only works if you don't use a password or pin?

                    0xabad1dea@infosec.exchange0 This user is from outside of this forum
                    0xabad1dea@infosec.exchange0 This user is from outside of this forum
                    0xabad1dea@infosec.exchange
                    wrote last edited by
                    #35

                    @babble_endanger @oilheap if you have a password on bitlocker itself (as opposed to your Windows account) then yes, this debug backdoor cannot work.

                    1 Reply Last reply
                    0
                    • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

                      @jernej__s they're just empty log files (a header plus megabytes of zeroes), presumably because if they're missing entirely, something errors out before the flag gets processed

                      jernej__s@infosec.exchangeJ This user is from outside of this forum
                      jernej__s@infosec.exchangeJ This user is from outside of this forum
                      jernej__s@infosec.exchange
                      wrote last edited by
                      #36

                      @0xabad1dea Looks like one of the files causes winpeshl.ini on the ramdrive to be deleted, which eventually results in command prompt to be spawned instead of the usual UI.

                      1 Reply Last reply
                      1
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups