| personal blog | https://codewrecks.com |
| personal blog | https://codewrecks.com |
I had a quick look at the Defender/WSL (Windows Subsystem for Linux) thing at lunch.
It's pretty comical, it looks like the WSL team have unfortunately undercut Defender. E.g. you don't even need to port a backdoor to Linux to maintain access on isolation -- you can just run a Windows trojan in Wine (works in WSL) & the network traffic isn't inspected, logged in Advanced Hunting Query or blocked on isolation. Also WSL can access any local or network files. And it ships built into Windows OS.
I have found the first of will likely be many non-expiring password reset URLs that you may have had stored in #LastPass
If you had a maxmind.com URL in LastPass that included set-password?token= in the parameters, I just tested and those do not expire... Possession of the URL is all you need in order to change the password.
Shame shame, Maxmind.
Want to hunt for your own possibly sensitive URLs? Start with this against your vault export.
cat lastpass_export.csv | cut -d',' -f 1 | grep -a -i -e '^http' | grep -v 'http://sn' | egrep -i '(api|password|reset|secret|token)'
Aw, SHA-1. Thanks for the hashes.
https://www.nist.gov/news-events/news/2022/12/nist-retires-sha-1-cryptographic-algorithm