• PhreakyByNature@feddit.uk
    link
    fedilink
    English
    arrow-up
    154
    arrow-down
    1
    ·
    7 months ago

    Anyone who has to use Windows and suffers this, PowerToys is your friend. Locksmith identifies what’s locking your file and allows you to free it up. Dunno why PowerToys isn’t bundled by default tbh.

    • ProfessorProteus@lemmy.world
      link
      fedilink
      English
      arrow-up
      114
      arrow-down
      4
      ·
      7 months ago

      Dunno why PowerToys isn’t bundled by default tbh.

      PowerToys give the user more power, which goes directly against Microsoft’s own goal.

      Also, less seriously, “toys” implies the user might enjoy the experience, and you know they can’t let that happen.

      • alqloe@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        11
        arrow-down
        39
        ·
        7 months ago

        Shut up. It is literally made by Microsoft. As a place to experiment what to include in Windows. Don’t argue with strawmen

        • danc4498@lemmy.world
          link
          fedilink
          English
          arrow-up
          31
          arrow-down
          1
          ·
          7 months ago

          Shut up. I also think power toys that feature basic functionality and have been around for decades should be included in Windows. I can’t always install this on a computer that needs it.

      • Omgboom@lemmy.zip
        link
        fedilink
        arrow-up
        11
        ·
        7 months ago

        Psexec can be pretty dangerous. Psexec.exe -i -s gives you access to the NTAUTHORITY/SYSTEM account, which is higher than Administrator. One time at work I was trying to do something and was getting permission denied so I decided to use that to get around the problem, I got to spend the afternoon talking to our security administrator because he got a bunch of alerts from our antivirus.

        • elvith@feddit.de
          link
          fedilink
          arrow-up
          5
          ·
          7 months ago

          Never thought about that, but since these tools just work, when you copy them to your PC… how does psexec do that? It’d either need you to be an administrator (and then it’s not really a privilege escalation as you could have registered any program into the task scheduler or as a service to run as SYSTEM) or it’d need a delegate service, that should only be available when you use an installer - which again wasn’t was has been done when just copying the tool.

          • 0xD@infosec.pub
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            7 months ago

            You need Administrative permissions for psexec. It uploads a file to the target computer’s \admin$ share (just C:\Windows) and starts a service to execute it. Services run as SYSTEM so that’s why you get those privileges.

            (Hah, I forgot your message while typing mine and just copied you :)

            Edit: fixed c$ to admin$

            • elvith@feddit.de
              link
              fedilink
              arrow-up
              3
              ·
              edit-2
              7 months ago

              I found a blog post outlining exactly that. If you use it locally, it will install and start a service temporarily. That service runs as SYSTEM and invokes your command. To succeed, you need to be a local administrator.

              If you try the same remote, it tries to access \\remote-server-ip\$admin and installs the service with that. To succeed your current account on your local machine must exist on the remote machine and must be an administrator there.

              So in short: It only works, if you’ve already the privilege to do so and the tool itself is not (ab)using a privilege escalation or something like that. Any hacker and virus may do the very same and doesn’t need psexec - it’s just easier for them to use that tool.

              • 0xD@infosec.pub
                link
                fedilink
                arrow-up
                1
                ·
                edit-2
                7 months ago

                Thank you for clearing it up!

                And regarding your assessment: Exactly!

    • kuneho@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      7 months ago

      I recently discovered Resource Monitor (resmon) can do that, too!

      I was using Unlocker waaaay back, I loved it. Since then I wasn’t looking for alternatives, but since resmon also can do that, it’s more than enough.

    • 0xD@infosec.pub
      link
      fedilink
      arrow-up
      4
      ·
      7 months ago

      Because it’s still in development, but afaik it is the goal to include it once it’s stable.

    • Car@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      4
      arrow-down
      1
      ·
      7 months ago

      I always thought it wasn’t included by default to mitigate malware damage to a system. Malware needs to be just a little bit more advanced if it can’t hijack Powertools to do what it wants

      • palordrolap@kbin.social
        link
        fedilink
        arrow-up
        6
        arrow-down
        2
        ·
        edit-2
        7 months ago

        Any self-respecting malware writer will download and decompile the Powertools to find out what API calls are being used. Especially if they’re calls to an undocumented API.

        Having Powertools on your computer is thus not the security hole it might appear to be.

        The fact they exist at all - well that’s not really a security hole either. Their existence just more quickly dissolves any security-by-obscurity that might have existed. Someone would have found those calls another way.

        One might suppose that they contain something special that’s not in the stock OS, but then we’re back to the malware writer’s reverse engineering which would lead them to learn and implement their own versions of whatever it is that Powertools does.