GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Mr. Bitterness (wdormann@infosec.exchange)

  1. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Tuesday, 04-Nov-2025 11:11:58 JST Mr. Bitterness Mr. Bitterness

    Microsoft:

    As much as 30% of the company's code is written by AI.

    Also Microsoft:
    Somehow we managed to make it so that clicking the x in Task Manager doesn't close the app. Whoopsie daisy!

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/463/758/861/236/645/original/2fff515a1fda37bf.png
  2. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Tuesday, 04-Nov-2025 11:11:57 JST Mr. Bitterness Mr. Bitterness
    in reply to

    See also:
    For a while, "Update and shut down" did not shut down the computer. It reboots it.
    https://www.windowslatest.com/2025/11/02/update-and-shut-down-no-longer-restarts-pc-as-windows-11-25h2-patch-addresses-a-decades-old-bug/

    A job done, folks.

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.windowslatest.com
      A brand new Microsoft Teams desktop app is coming and it's web-based
      from @mayank_jee
      Microsoft’s tools have seen a flurry of changes over the past few years. Progressive Web Apps (PWAs) are going to be an important part of the Windows app ecosystem going forward, and Microsoft is betting big on it. The latest is a new Progressive Web App for Microsoft Teams that will be offered for low-end […]
  3. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Wednesday, 29-Oct-2025 04:11:41 JST Mr. Bitterness Mr. Bitterness

    I've noticed that Gmail is letting a pattern of spam messages through lately (maybe the past month or two?).

    With the subject line of Delivery Status Notification (Failure) and then just a junk email body.

    Just me? Is using a subject line of Delivery Status Notification (Failure) really all it takes to get past Gmail's spam filtering?

    In conversation about 8 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/453/279/983/177/054/original/b0a6dc6f7a7cb502.png
  4. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Thursday, 09-Oct-2025 02:39:15 JST Mr. Bitterness Mr. Bitterness
    • Kevin Beaumont

    @GossiTheDog
    Three clicks is a lot to expect, I suppose.

    In conversation about a month ago from gnusocial.jp permalink
  5. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Thursday, 09-Oct-2025 01:32:36 JST Mr. Bitterness Mr. Bitterness

    For some reason, people seem to be spun up about recent changes that allegedly force people to create Microsoft accounts during Windows 11 setup.

    Except, nothing is being forced.
    Windows 11 Pro or better:
    Just do the usual:

    1. Set up for work or school
    2. Sign-in options
    3. Domain join instead
    4. Create local account.

    Windows 11 Home:
    Ok, fine. Microsoft has indeed removed the OOBE.CMD batch file. But you know what? You can run the command that a batch file runs without the batch file itself?
    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /v BypassNRO /t REG_DWORD /d 1 /f
    Once you reboot, you'll have the I don't have internet link, where you can create a local account.

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/339/098/324/820/507/original/0c702edb7cf88c97.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/339/098/336/907/693/original/73f8d637c48da2ec.png

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/339/098/349/572/219/original/643e0ae19d349b4f.png

    4. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/339/099/231/060/018/original/d0c84dbe5a016502.png
  6. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Wednesday, 27-Aug-2025 07:01:42 JST Mr. Bitterness Mr. Bitterness

    I approve.

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/091/740/267/819/777/original/f82a022d7dde9742.jpeg
  7. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Wednesday, 23-Jul-2025 13:12:09 JST Mr. Bitterness Mr. Bitterness

    NGL... Super Sauce tomatoes are kind of ridiculous.

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/900/505/431/833/053/original/83cbd76bb20277a8.jpeg
  8. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Sunday, 25-May-2025 00:11:47 JST Mr. Bitterness Mr. Bitterness
    in reply to

    I leave for vacation a week ago with Twitter down, and as I return it's (still/again/🤷♂️) down.
    Great job, folks!

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/563/217/651/895/953/original/1a241080547799f3.png
  9. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Sunday, 25-May-2025 00:11:47 JST Mr. Bitterness Mr. Bitterness

    Please don't bother coming back.
    KTHXBYE

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/523/377/317/595/933/original/b792df1bd59374e2.png
  10. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Wednesday, 14-May-2025 02:37:45 JST Mr. Bitterness Mr. Bitterness

    Ooh, another of my NTFS vulnerabilities that I reported years ago was patched today. 🎉
    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707

    In conversation about 6 months ago from infosec.exchange permalink
  11. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Wednesday, 14-May-2025 00:22:47 JST Mr. Bitterness Mr. Bitterness

    I'm at a meeting hosted by somebody else where they're using Microsoft Teams, and in the chat I attempted to share an image that is on my laptop. By clicking the + button and Attach file.

    The result of doing this is that Teams puts the image in MY COMPANY'S SHAREPOINT SERVER, and nobody else in Teams can see the image because they DON'T HAVE AN ACCOUNT on my company's SharePoint server. 🤦♂️

    Wonders:
    1) Has anybody at Microsoft actually tried using Teams?
    2) Why do people choose to use Teams?

    Aside: If you copy an image and press Cmd - V to put the image in the chat, Teams actually... puts the image in the chat.

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/501/201/358/592/222/original/03cbbcbea6ab57d9.png
  12. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Tuesday, 13-May-2025 03:23:55 JST Mr. Bitterness Mr. Bitterness

    It's fruit update time.
    https://support.apple.com/en-us/100100

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Apple security releases - Apple Support
      This document lists security updates and Rapid Security Responses for Apple software.

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/496/091/652/470/910/original/31285c09c3d0fc9c.png
  13. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Friday, 09-May-2025 13:13:52 JST Mr. Bitterness Mr. Bitterness
    in reply to
    • Brian Clark

    @deepthoughts10
    No, Tamper Protection does nothing to stop this.

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


  14. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Friday, 09-May-2025 05:10:21 JST Mr. Bitterness Mr. Bitterness

    Neat way to disable Windows Defender (or possibly other AV products)...

    Register a no-op AV product in the Windows Security Center (WSC). This action is protected by an NDA that AV vendors sign, and, well...

    Anyway, yeah, admin users can do admin things. Don't forget that.

    https://github.com/es3n1n/defendnot

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/474/016/191/416/836/original/c1cc0ab02f3454bc.png
  15. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Mr. Bitterness Mr. Bitterness
    in reply to

    Oh, what's that?
    'NICIPConfigUpdateDeployment-1745511600265' is not valid?

    Oh, let me put my Azure translation hat on. Ok, got it:

    You have exceeded your limit of 10 publicly available IP addresses. Please first Disassociate the IP address and then delete it. Otherwise you will get another error message.

    Boy, this hat is useful.
    Just kidding. There's no such hat.
    You need to trudge through things until you brute-force figure things out.

    Time to go touch grass...

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/394/045/439/163/623/original/30076432cca1f602.png
  16. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Mr. Bitterness Mr. Bitterness
    in reply to

    What's that?

    The "Most used by Azure users" VM type that I picked isn't available?

    You know what, instead of Go Fish, maybe tell me what I can use?

    Edit: Azure Spot pricing apparently isn't a thing. No matter which Size + Region combination you choose, you'll get an error that says that the combo isn't available where you want it. 🤦♂️

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/820/926/795/345/original/5559760f76334056.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/821/371/981/644/original/c122cb0b6873f44a.png
  17. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Mr. Bitterness Mr. Bitterness
    in reply to

    What's that? I need to remove the number of data disks in my VM? Maybe tell me how to do this?

    Ohhhh... You've selected an Azure VM image that requires more than 4 disks, and the VM type currently selected has only 4 disks? I'm no UI/UX expert, but maybe just TELL ME THIS?

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/791/242/538/845/original/68441ab2dff3f3c5.png
  18. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Mr. Bitterness Mr. Bitterness

    If you create an ARM VM in Azure, beware that your "Recently used size" will be ARM, and as such you will not be able to create any preconfigured x64 VMs.

    Because of course if your "Recently used size" is ARM, Microsoft will disable the ability to pick an x64 size. 🤦♂️

    Yes, I had to create a sacrificial x84 VM in Azure to work around this. Once my recently used size was x64, I was able to pick any size that I wanted.

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/660/047/299/710/original/b8c83e056a7bd900.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/660/464/816/983/original/b2b5148efbc9de3f.png
  19. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:44 JST Mr. Bitterness Mr. Bitterness
    in reply to

    Now that I have a local copy of the Commvault VM so that I don't burn truckloads of Azure dollars, I can look at things at my leisure.

    AND, it seems that the VM that I have is 11.38.25, which contains the fix for CVE-2025-34028.

    EXCEPT the exploit for CVE-2025-34028 still works against it. 🤦♂️

    Commvault claims that 11.38.20 and 11.38.25 fixes the watchTowr-reported CVE-2025-34028 vulnerability. (Aside: How is it even possible that two different versions in the same product line are the ones that fix a single vulnerability?) watchTowr discovered the bug in 11.38.20.

    I trust watchTowr, so I don't believe Commvault's statement that 11.38.20 fixes the vulnerability that watchTowr found in 11.38.20.

    I also trust the PoC that I just ran against 11.38.25, so I don't believe Commvault's statement that 11.38.25 fixes the vulnerability that watchTowr found in 11.38.20.

    Yes, I have trust issues. 😕

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/901/003/124/252/original/4d7dcf947b77b06c.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/903/072/597/218/original/bc949823bc70c827.png

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/905/102/553/591/original/8249341a63d86457.png
  20. Embed this notice
    Mr. Bitterness (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:44 JST Mr. Bitterness Mr. Bitterness
    in reply to

    After successfully touching grass and beginning to write up CVE-2025-34028...

    CVE-2025-34028 is a path traversal vulnerability. And yes, the path traversal allows for an unauthenticated attacker to plant files in arbitrary locations. And presumably Commvault has fixed the path traversal part.

    BUT, what about the fact that deployCCPackage() is reachable by design (by way of deployServiceCommcell.do being explicitly listed in authSkipRules.xml)?

    Directory traversal aside, in what world does the ability for an unauthenticated client to deploy a Command Center package make sense, whatever that means? 🤔

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


  • Before

User actions

    Mr. Bitterness

    Mr. Bitterness

    I play with vulnerabilities and exploits, but am forbidden to discuss such things publicly. I used to be https://twitter.com/wdormann but Twitter has become unbearable, so here I am.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          232810
          Member since
          16 Jan 2024
          Notices
          143
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.