GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 18-Apr-2025 05:07:58 JST Kevin Beaumont Kevin Beaumont

    Can confirm running this command as a non-admin user breaks April 2025 Windows OS patch installing on Windows 10 and 11, tested on home, pro and enterprise SKUs.

    mklink /j c:\inetpub c:\windows\system32\notepad.exe

    In conversation about a month ago from cyberplace.social permalink
    • Embed this notice
      Polychrome :blabcat: (polychrome@poly.cybre.city)'s status on Thursday, 10-Apr-2025 23:42:28 JST Polychrome :blabcat: Polychrome :blabcat:
      @GossiTheDog wish I knew of this before the CoPilot update.
      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      GeneralX (generalx@freeradical.zone)'s status on Friday, 11-Apr-2025 00:06:54 JST GeneralX GeneralX

      @GossiTheDog IIS is still a thing?

      In conversation about a month ago permalink
    • Embed this notice
      A More Honest Dystopia (h2onolan@infosec.exchange)'s status on Friday, 11-Apr-2025 00:31:12 JST A More Honest Dystopia A More Honest Dystopia

      @GossiTheDog okay but i now have an inetpub directory on a bunch of windows systems that was not there April 7.

      In conversation about a month ago permalink
    • Embed this notice
      dave (hologram@cyberplace.social)'s status on Friday, 11-Apr-2025 00:37:18 JST dave dave

      @GossiTheDog Very good, but what appalls me is "We noticed you regularly use your device between 3:00 PM and 8:00 AM". Who is "We"? The Queen of England? Fuck those people. One of many reason why I will not use windows, and why I will not sell myself out to solve any windows-specific problems. Windows Is the problem, to the extent it is not stolen property.
      Do I forgive Dave Cutler for selling out? No I do not. I think he was top notch, the sellout to Gates = Fail

      In conversation about a month ago permalink

      Attachments


    • Embed this notice
      Fritz Adalis (fritzadalis@infosec.exchange)'s status on Friday, 11-Apr-2025 01:06:28 JST Fritz Adalis Fritz Adalis

      @GossiTheDog
      Can you do anything other than prevent installation? Maybe a hard link to system32 could break the machine if it changes the perms. Maybe a toctou bug, watch the ntfs journal until the folder is there then replace with a hard link?

      In conversation about a month ago permalink
    • Embed this notice
      DistroWatch (distrowatch@mastodon.social)'s status on Friday, 11-Apr-2025 01:50:47 JST DistroWatch DistroWatch

      @GossiTheDog Windows allows non-admin users to create any folder they want in C: \ ?
      That seems like a pretty big security issue on its own.

      In conversation about a month ago permalink
    • Embed this notice
      m1rk0 (m1rk0@defcon42.net)'s status on Friday, 11-Apr-2025 02:02:10 JST m1rk0 m1rk0
      • DistroWatch
      @GossiTheDog @distrowatch You can't, if the system is properly configured. By default i think you are right, but default is in most cases horseshit regardless of system or software.
      In conversation about a month ago permalink
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Friday, 11-Apr-2025 03:35:47 JST Will Dormann Will Dormann

      @GossiTheDog
      Specifically, I've seen all April updates install even when C:\inetpub exists ahead of time.

      I should have known better than to attribute the correlation of C:\inetpub in a VM before updates to the causation of a failed update.

      What happens with C:\inetpub is tough to see, as it either happens before the Procmon boot driver loads, or Procmon is otherwise foiled by the updates occurring. But either way, there's a bit of a blind spot between pre-reboot C:\inetpub not being there and it being there post-reboot. A Procmon boot log sees nothing. 😕

      In conversation about a month ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/085/369/818/791/original/2e70f29df7d7ed13.png

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/096/002/788/236/original/c73ec6e4493404ac.png
    • Embed this notice
      Christian (chrst@lethallava.land)'s status on Friday, 11-Apr-2025 03:37:51 JST Christian Christian

      @GossiTheDog@cyberplace.social something something Junction Points something something…

      In conversation about a month ago permalink
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Friday, 11-Apr-2025 04:30:15 JST Will Dormann Will Dormann

      @GossiTheDog
      Ah, that'd do it!
      But at the same time, creating files in the root directory requires admin privileges.
      And if you're a trigger-happy admin, there are plenty of footguns that you can use. 🤷♂️

      In conversation about a month ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/306/010/556/017/original/4edcd62c718580ca.png

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/312/018/694/860/original/c76890f4e4d646cb.png
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Friday, 11-Apr-2025 04:50:57 JST Will Dormann Will Dormann

      @GossiTheDog
      You can?
      Non-admin users don't have SeCreateSymbolicLinkPrivilege, so I don't believe you. 😀

      In conversation about a month ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/339/916/620/405/original/0ac365f918db7466.png
    • Embed this notice
      qdkp (qdkp@cyberplace.social)'s status on Friday, 11-Apr-2025 04:52:54 JST qdkp qdkp
      in reply to
      • Will Dormann

      @wdormann @GossiTheDog Could you use a junction instead?

      In conversation about a month ago permalink
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Friday, 11-Apr-2025 05:00:25 JST Will Dormann Will Dormann

      @GossiTheDog
      Just to be clear, while mklink /h can itself be used by a non-admin user, that same non-admin user would not be able to create a hard link in C:\ as that would be the same as creating a file there. Which non-admin users can't do.

      In conversation about a month ago permalink
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Friday, 11-Apr-2025 05:29:26 JST Will Dormann Will Dormann

      @GossiTheDog
      Ah, you'd think that you couldn't.
      But indeed you can!
      That is, a non-admin user can create a "directory" junction to a file target, which will have the result of April's security updates failing to install. 😂

      It seems that this weird concept of a junction to a file achieves an unexpected double-standard:

      1. It counts as a directory when it comes to NTFS ACLs (a non-admin user can create a junction in C:\)
      2. Depending on how the junction is accessed, it might count as a file as opposed to being treated as a directory.

      This seems like a problem. Obviously in the case of April's updates here. But perhaps even more generically in that a junction to a file target seems to almost guarantee unexpected behavior.

      In conversation about a month ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/468/118/374/963/original/117737951bd66c59.png

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/468/098/079/634/original/231bb5eedc25ad85.png

      3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/494/751/134/719/original/1f3da3b5b4a3c3d9.png

      4. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/468/576/264/239/original/637c727e33bcbaa2.png
    • Embed this notice
      Busta (busta@infosec.exchange)'s status on Friday, 11-Apr-2025 21:09:29 JST Busta Busta
      • Will Dormann

      @GossiTheDog @wdormann They updated the FAQ for CVE-2025-21204 saying that it's intended and shouldn't be deleted as it will increase the system protection, lol.

      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204

      In conversation about a month ago permalink
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Friday, 11-Apr-2025 21:29:32 JST Will Dormann Will Dormann
      • Busta

      @GossiTheDog @Busta
      Hilarious.
      The two things that MSRC seems to aim to to achieve are:

      1. Avoid saying anything about what their security updates do unless their hand is forced.
      2. Take the path of "least resistance" as opposed to fixing the root cause of problems. (In this case, non-admins can create subdirectories directly off of C:\)

      https://infosec.exchange/@wdormann/114319281111054638

      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: media.infosec.exchange
        Will Dormann (@wdormann@infosec.exchange)
        from Will Dormann
        Attached: 2 images So, apparently this is the "fix" for [CVE-2025-21204](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204). Microsoft recently updated their advisory to say what the update does. Prior to everybody freaking out, the advisory for CVE-2025-21204 said nothing about what it does. Two gripes: 1. MSRC publishing content-free advisories has consequences, but they never seem to appreciate this. 2. I told MSRC **YEARS AGO** that they can avoid an entire class of LPE vulnerabilities in 3rd-party software **and** their own software by not allowing non-admin users to be able to create directories off of `C:\`. They refused to make any change because it might "break things". Great job, folks.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 18-Apr-2025 05:09:30 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Bonus points, if you run it from cmd.exe, it’s not logged in EDR products or detectable as mklinks is built into cmd.exe, doesn’t spawn another process.

      In conversation about a month ago permalink
    • Embed this notice
      Carsten (cblte@nrw.social)'s status on Friday, 18-Apr-2025 06:26:32 JST Carsten Carsten
      in reply to

      @GossiTheDog I am curios if this works on company provisioned laptops....

      In conversation about a month ago permalink
    • Embed this notice
      dave (hologram@cyberplace.social)'s status on Friday, 18-Apr-2025 06:37:33 JST dave dave
      in reply to

      @GossiTheDog I used to care. Now, it's way past fuck Bill Gates and all Microsoft bullshit. Let it crash and burn. 🍺

      In conversation about a month ago permalink
    • Embed this notice
      TechNomad (technomad@cyberplace.social)'s status on Friday, 18-Apr-2025 06:42:50 JST TechNomad TechNomad
      in reply to

      @GossiTheDog I completely deleted the Windows operating system 3 years ago. yes, I am a .net developer but I use jetbrains IDE. I don't care about windows ecosystem anymore.

      In conversation about a month ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 18-Apr-2025 06:48:54 JST Kevin Beaumont Kevin Beaumont
      in reply to

      I just realised my original thread on this auto deleted after a week, but it’s a vuln in Windows that MS introduced this month. I’ve reported it to MSRC. You can use it to stop Windows updates.

      In conversation about a month ago permalink
    • Embed this notice
      Brian Clark (deepthoughts10@infosec.exchange)'s status on Friday, 18-Apr-2025 06:59:14 JST Brian Clark Brian Clark
      in reply to

      @GossiTheDog I didn’t realize this part. It won’t show up in MDE logs?

      In conversation about a month ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.