[14959] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Fwd: [nohack] Yet another way to disguise files.

daemon@ATHENA.MIT.EDU (Dan Harkless)
Fri May 19 18:23:42 2000

Message-Id:  <200005182059.NAA50096@dilvish.speed.net>
Date:         Thu, 18 May 2000 13:59:18 -0700
Reply-To: Dan Harkless <dan-bugtraq@DILVISH.SPEED.NET>
From: Dan Harkless <dan-bugtraq@DILVISH.SPEED.NET>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  Message from Ron DuFresne <dufresne@WINTERNET.COM> of "Tue, 16
              May 2000 18:10:28 CDT."
              <Pine.GSO.4.05.10005161810010.7654-100000@tundra.winternet.com>

Ron DuFresne <dufresne@WINTERNET.COM> writes:
> Has anyone verified if this is also the case on NT boxen?

Yes -- I did my testing on NT 4.0 Service Pack 5.

One thing I've discovered since I made the NeverShowExt -> AlwaysShowExt
changes mentioned by the original author is that all shortcuts now have .lnk
on the ends of their names.  Kind of annoying (wish NTFS was a real file
system that allowed links without this "hide the file extension" hack).

It would be tempting to change .lnk back to NeverShowExt, but since
shortcuts can include parameters to a pointed-to executable, what's to stop
a malicious person from emailing a file called neatinfo.txt.lnk that's a
link to something like "C:\dos\format.exe C:"?  I'm sure there are scarier
examples as well, not requiring the user to have DOS installed or to have to
approve the destructive action.

----------------------------------------------------------------------
Dan Harkless                   | To prevent SPAM contamination, please
dan-bugtraq@dilvish.speed.net  | do not mention this private email
SpeedGate Communications, Inc. | address in Usenet posts.  Thank you.

home help back first fref pref prev next nref lref last post