Sunday, October 26, 2025

How to fix ASP.NET Core Vulnerability HTTP request smuggling bug scores 9.9



ASP.NET Core HTTP request smuggling bug scores 9.9

‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability



CVE-2025-55315 is an HTTP request smuggling bug leading to information leaks, file content tampering, and server crashes.


What is HTTP request smuggling




How to fix the issue 




Saturday, October 25, 2025

grepWin 2.1.11 is the last working version on Windows 7




I am a big fan of Stefan Küng's grepWin because of it's blazing fast speed and it's open source c++ code. Got confirmation on Github - 2.1.12 no longer runs on Windows 7 · Issue #563.

Version 2.1.11 is last working version on Windows 7.


You can download all the releases here -  stefankueng/grepWin (github.com)

Latest Version 2.1.12 Issues

The new Version 2.1.12 (Sept 24, 2025) gives me the following error on Windows 7.

Specifically, running on the following hardware; 

Microsoft Windows 7 Ultimate  SP 1 (6.1.7601.24546), Intel Core i7 CPU 920 @ 2.67GHz * 4, 12GB RAM, NVIDIA GeForce GT 7, 10 2GB * 1, 1TB HD

Get this above one line summary here - SimpleSystemInfo-TheOneLiner-V2 (github.com) 👀

Tried portable editions (x86 & x64) did not work, they are supposed to be self-contained builds.

Mitigation

New, Version 2.1.12 gives me the following error on Windows 7.

Go the following popup error.

---------------------------

grepWin.exe - System Error

---------------------------

The program can't start because 
api-ms-win-core-path-l1-1-0.dll is missing from 
your computer. Try reinstalling the program to 
fix this problem. 

---------------------------

OK   

---------------------------


Dependency Hell


  1. I copied over the file from Windows 10, and then entire api-ms-win-*.dll then got Kernel.dll error. Got these dlls from ReactOS build env project.
  2. Copied over kernel_vista.dll from win10.
  3. Error in kernelbase.dll, copied from win10.
  4. Problem Event Name:	APPCRASH
      Application Name:	grepWin_dependancy.exe
      Application Version:	2.1.12.1434
      Application Timestamp:	68d43315
      Fault Module Name:	KERNELBASE.dll
      Fault Module Version:	6.1.7601.24545
      Fault Module Timestamp:	5e0eb7f5
      Exception Code:	c06d007e
      Exception Offset:	0000c5af
      OS Version:	6.1.7601.2.1.0.256.1
      Locale ID:	1033
      Additional Information 1:	0a9e
      Additional Information 2:	0a9e372d3b4ad19135b953a78882e789
      Additional Information 3:	0a9e
    

Essentially, it's a UWP app and built for Win8+, so I stopped.


Why still Windows 7? 




I develop migration tools that still must work on Win7 

Cloud Storage Phishing email with subject Reminder Personal cloud settings available now


For the record, this is a Cloud Storage 
phishing email attempt that is recently going around, with subject line "Reminder: Personal cloud settings available now". 

What to do?  
Report them, goto bottom of page. 


From : Hello {yourname} <newsletters.xjui@superportal1456.notisart.cl>

Subject
 : Reminder: Personal cloud settings available now 



Link gets you here






PHISHING LINKs;

1. http://xn--8hiv2szvuat-odb60k.indelust.com/xxxx?yyyy


How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing to Google

If you have received this email, take further action by

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Friday, October 24, 2025

Express Pharmacy Phishing email with subject Claim your 5-10% discount code now


For the record, this is a Express Pharmacy 
phishing email attempt that is recently going around, with subject line "Claim your 5-10% discount code now". 

What to do?  
Report them, goto bottom of page. 


From : Men's Health <pharmacy.online.coupon@gmail.com>

Subject
 : Claim your 5-10% discount code now.


Link gets you here




PHISHING LINKs;

1. http://www.automac.it/farm.html


How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing to Google

If you have received this email, take further action by

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Tuesday, October 7, 2025

GUI for Azure Trusted Signing Local Exe dotNet 4.8



Graphical User Interface for Microsoft Azure Trusted Signing
 to code sign your local application, ported to Net 4.8 Framework from GUI-for-ATS

GUI for ATS is a user-friendly graphical interface that simplifies the use of Microsoft Azure Trusted Signing. It streamlines the process of signing files, making it easier for developers and businesses to integrate secure code signing into their workflow.


🔐 Security Advantage

The main advantage of this application is that you do not need to create the environment variables
AZURE_CLIENT_IDAZURE_TENANT_ID, and AZURE_CLIENT_SECRET.
This data is securely stored in encrypted form after you enter it and is only used in plaintext during the signing process.


GUI Screenshot


🔧 Requirements