rejetto forum

Recent Posts

1
Other languages / Just want to say Hi!
« Last post by PhillipHen on Today at 05:31:22 AM »
Nicely put, Regards!
2
Other languages / Just want to say Hello!
« Last post by PhillipHen on Today at 05:17:35 AM »
Regards, I value it!
3
Other languages / I am the new guy
« Last post by PhillipHen on Today at 05:11:48 AM »
Thank you! Quite a lot of tips!
4
Other languages / Im glad I now signed up
« Last post by PhillipHen on Today at 04:56:52 AM »
Incredible tons of superb facts!
5
Bug reports / Re: Hfs.exe - Maulware via PUP
« Last post by TEA-Time on February 06, 2023, 09:49:19 PM »
Yup, what Leo said, plus bad actors have abused HFS for nefarious purposes (much like the SysInternals and NirSoft utilities) in the past because of its ability to serve up and receive files.


-Tim
6
Beta / Re: version 2.4
« Last post by TEA-Time on February 06, 2023, 09:42:00 PM »
Hi Tim, sorry for my late reply.
It's easy, just do this...

Instructions:
1) Go to HFS, Virtual File System
2) Right-click on the Home/Root
3) Properties...
4) Diff template
5) Paste this text:

Code: [Select]
[+]
<script>
$("div[class^=item-type-link]").each(
 $('a').each(function(){
  $(this).attr('target', '_blank');
 })
);
</script>

6) Click on 'Apply' and 'OK'.
This is only valid for HFS v2.4.0 RC6 (default template)

Cheers,
Leo.-

It works.  :)   Thank you very much!


-Tim
7
Bug reports / Re: Hfs.exe - Maulware via PUP
« Last post by LeoNeeson on February 06, 2023, 09:10:36 PM »
Hi, if you have it downloaded from a ‘trusted source’ (from here or here), you can rest assured it is a ‘false positive’. About the digital signature, ‘code signing’ is expensive (not free, even for open source projects).
8
Bug reports / Hfs.exe - Maulware via PUP
« Last post by pboserup on February 06, 2023, 07:23:12 PM »
Our AV - Crowdstike is alerting and quarantining hfs.exe.

Objective
Falcon Detection Method
Tactic & technique
Malware via PUP
Technique ID
CST0013
Specific to this detection
This file is classified as Adware/PUP based on its SHA256 hash.

Also the exe does not have a digital signature.

Any thoughts?
9
Bug reports / Re: False errors on upload
« Last post by Mars on January 26, 2023, 10:15:57 PM »
so it looks like this folder is visible in the VFS, since you changed the access properties there

try to go to the diff template tab and you can place a customization of the upload results there by adding this section

Code: [Select]
[+upload-success]
{.add to log|{.filename|%item-resource%.}=uploaded by {.if|{.length|%user%.}|%user%|Anonymous /if.}./add to log.}
10
Bug reports / Re: False errors on upload
« Last post by Wg816 on January 26, 2023, 09:33:42 AM »
Appears for one of the following reasons:

when sending each file with the method that was used for it
- the logged in user does not have write rights to upload file in the folder
- the user and the password used do not correspond to a registered account values

I think I'm on to something based on the second thing you said.  When the users download a file, it says "User@ipaddress:port" on the server log.
When the user goes to the "Upload" folder to send a file, the server log does NOT have the user.  It only says "ipaddress:port."  The user may have permissions to the folder, but only the IPaddress is shown to be the one accessing the folder.  The file is sent, deleted, and then sent again successfully.  Very weird.

Solution??  right click on "Upload" folder and set Access to "Anyone" and Upload to "Anyone."   Problem solved in a bad way.

Why does the User disappear from the log only in that specific folder with?   What's a better solution?