Most active commenters

    ←back to thread

    1192 points gniting | 29 comments | | HN request time: 1.151s | source | bottom
    1. cheschire ◴[] No.43519772[source]
    Can windows apps (not installed from the MS store) enumerate through the window titles of all open windows? How hard would it be for an app to monitor all of your web traffic based on the title alone?

    Legit question. ChatGPT isn't super helpful here since it agrees with everything when I'm really looking for someone to say why this isn't really feasible in the real world.

    replies(8): >>43519783 #>>43519798 #>>43519847 #>>43519871 #>>43520382 #>>43520475 #>>43521311 #>>43521404 #
    2. gruez ◴[] No.43519783[source]
    Most windows apps aren't sandboxed, so them being able to grab window titles is the least of your worries. Any program can steal your login sessions and passwords if they wanted to.

    https://xkcd.com/1200/

    replies(1): >>43519795 #
    3. facile3232 ◴[] No.43519795[source]
    Are you essentially discussing like a keylogger? I can't imagine windows intentionally keeps the plaintext password anywhere longer than it needs to be.
    replies(5): >>43519816 #>>43520114 #>>43520858 #>>43522437 #>>43523306 #
    4. edoceo ◴[] No.43519798[source]
    Yep, not difficult at all.

    This prompt got me some mostly looks OK Python

    > Can you make a simple windows program that will get all the window titles from active programs running

    replies(1): >>43520177 #
    5. gruez ◴[] No.43519816{3}[source]
    Obviously there's no way for a malicious program to grab your login credentials that you've entered into an incognito tab that have been closed. There might not be sandboxing, but viruses can't timetravel yet. However that's not going to be much of a defense when many users use password managers, and are terrible at detecting malware (so it's only a matter of time before their passwords are keylogged).
    replies(1): >>43520008 #
    6. ranger_danger ◴[] No.43519847[source]
    Not only can most apps see the titles of all other open windows on the system, but they can log all your keystrokes, take screenshots, record audio/video of you or your screen, or copy/delete all the files in your home directory, without any explicit permission or notification.

    This is at least true for Windows and most traditional (X11 at least) *nix systems.

    That is one thing I think Android got right... by default it runs every application as a different user. That means different home folders and no visibility into other apps.

    replies(2): >>43519945 #>>43520312 #
    7. myself248 ◴[] No.43519871[source]
    Oh yeah, AutoHotKey's ability to do this actually underlies a lot of useful AHK scripts.
    replies(1): >>43520585 #
    8. esprehn ◴[] No.43519945[source]
    Originally Android apps could draw over top of any other app though which is a phishing nightmare. It took them a long time to make that a permission, and then everyone granted it until they finally added the bubbles API recently.

    Permissions are difficult to get right, and Android is unfortunately pretty slow to react.

    9. misnome ◴[] No.43520008{4}[source]
    > viruses can't timetravel yet

    _Windows Recall to the rescue!_

    10. halfcat ◴[] No.43520114{3}[source]
    > I can't imagine windows intentionally keeps the plaintext password anywhere longer than it needs to be.

    Can’t tell if serious or not [1]. Also any program can read any saved password out of Windows Credential Manager.

    https://en.wikipedia.org/wiki/Mimikatz

    11. halfcat ◴[] No.43520177[source]
    Definitely possible. This is how chat bots worked on AOL in the 90’s, basically the FindWindow and FindWindowEx functions in the win32 API. Hasn’t changed much (if any) since then.
    12. Numerlor ◴[] No.43520312[source]
    On windows you shouldn't be able to do (most of) these directly with apps running under admin, though that's a small consolation when the browser is a normal process.

    I'm not sure if we'll get away from these anytime soon as any out of the box solution will inherently limit the user's freedom that has persistently been there for decades on PCs

    replies(1): >>43523941 #
    13. kelvinjps10 ◴[] No.43520382[source]
    In windows you can there is a api for windows titles, I knwo because I was building an app that needed it
    14. bcoates ◴[] No.43520475[source]
    Windows has a whole different (looser, older) security model. There are no security barriers between windows running on the same desktop. (In particular, "UAC is [still] not a security barrier"--when you hit ok/type in a password to elevate a process, you’re effectively elevating the whole desktop and everything you're running.)
    replies(2): >>43520653 #>>43520707 #
    15. yjftsjthsd-h ◴[] No.43520585[source]
    Right; I think having the API exist is a good thing, it's just a question of making sure that it's only used in ways that the user allows. Your own scripts inspecting and controlling arbitrary windows on your own machine => great, third party programs doing the same thing without your informed consent => bad. (In practice, this means I'm a big fan of extensive permission systems that have the ability to deny or fake responses at the user's direction)
    16. jorvi ◴[] No.43520653[source]
    No, that is completely wrong and would be nuts. The only way the whole session gets elevated is if you'd launch explorer.exe with an admin token.

    The way privilege escalation works on Windows is that pretty much everything gets launched with a standard user access token by default, and processes can request an admin access token in a few ways, UAC being the main one. When a process is supplied that token, that process is elevated.

    It is more akin to 'sudo' rather than 'su', which makes sense because its progenitor is 'runas' from Windows 2000.

    replies(1): >>43520731 #
    17. SpaghettiCthulu ◴[] No.43520707[source]
    Can you inject into an elevated process from a non-elevated one?
    18. bcoates ◴[] No.43520731{3}[source]
    (Only) the process is elevated, but the process has a window on a shared session, and the OS does not successfully protect processes that share a session (and user, and registry, and disk, etc., etc.) from controlling each other.

    From an API point of view, only one process is elevated. From a security point of view, if one process is elevated they all are, due to a lack of any effective mechanism that actually stops them.

    replies(1): >>43520812 #
    19. jorvi ◴[] No.43520812{4}[source]
    No, even then there are things like Mandatory Integrity Control and Windows Message Restrictions / UIAccess. I'd dive into to deeper but I just got home from going out haha. Those terms should help you dig into it though!

    I do fully agree that desktop OSes are a legacy security model and they can't hold a candle to that of iOS. Android is getting there, but because it also started from mostly an open all-access model it's been having the same warts.

    20. justonenote ◴[] No.43520858{3}[source]
    ita disconcerting to see such naivety around security issues on hn.

    not that windows is keeping passwords in plaintext, but that it's not immediately obvious that un-sandboxed apps that run on your windows/linux/mac desktop have virtually unlimited other avenues to capture passwords given they can read the entire state of other windows at the very least.

    I dunno maybe macos is slightly better, and wayland definitely has some things which are better about this, but desktop os and $locally_installed_app means $locally_installed_app basically has root, there is just an exploding amount of vectors.

    I'd like to see a linux based distrubution use some of the sandboxing in Android, it would be a order of magnitude improvement over what is going on now.

    replies(1): >>43520963 #
    21. facile3232 ◴[] No.43520963{4}[source]
    So like a keylogger. Thanks
    22. userbinator ◴[] No.43521311[source]
    Long-time Win32 programmer here - yes. This is by design. To use an analogy, Windows is like a "high-trust society".

    There are functions EnumWindows() and EnumChildWindows() specifically for this purpose.

    See utilities "Windows Modifier v2.00" (when I first downloaded it there were many pages about it, but it's a sign of how forgetful the Internet has become that I barely get any results about it now even searching for that exact name) and Microsoft's own Spy++ (SPYXX.EXE) for an example of this functionality.

    The solution to an app you don't trust is to not use it at all, or use it in a VM.

    replies(1): >>43521560 #
    23. tredre3 ◴[] No.43521404[source]
    > How hard would it be for an app to monitor all of your web traffic based on the title alone?

    Although not terribly accurate (because of the high variability of page titles), tools like ManicTime and ActivityWatch use windows titles to track your browser history if you don't install the browser plugin.

    https://www.manictime.com/

    https://activitywatch.net/

    24. phyzix5761 ◴[] No.43521560[source]
    How do you identify apps that you shouldn't trust? Sometimes trust is assumed only until evidence is given that trust shouldn't be given. Which makes no sense to me. Why was the initial trust so easily given?

    A solution is to not use third party apps but most people aren't going to go that route. The VM idea is a good option though.

    replies(1): >>43521964 #
    25. pjerem ◴[] No.43521964{3}[source]
    > Why was the initial trust so easily given?

    Because this architecture predates the existence of the current privacy nightmare.

    In fact it predates the general availability of the internet. How could a program you would install from a floppy/compact disk bought on a store behave maliciously if you didn’t or barely had access to the internet ?

    And then it stayed like this because Windows is heavily marketed as being retro compatible.

    replies(1): >>43528259 #
    26. 9dev ◴[] No.43522437{3}[source]
    That, but consider also how an application running with your user privileges has full access to the filesystem with those privileges, so it can read your entire home directory, for example. That includes your browser profile with all cookies, and all credentials that applications store there unencrypted. Not to mention how that allows for all the fingerprinting even the most nefarious marketer could wish for.

    Oh, and the UAC confirmations to elevate your apps permissions to root? People will gleefully confirm them without reading what needs access anyway, so you’re golden to do whatever you want.

    The security model of Windows doesn’t exist.

    27. Eavolution ◴[] No.43523306{3}[source]
    Actually windows can keep them in memory for a lot longer than you'd think, hence Mimikatz https://github.com/ParrotSec/mimikatz
    28. ranger_danger ◴[] No.43523941{3}[source]
    I have absolutely done all of these things on Windows, even for commercial applications. Programs that keylog (i.e. calls SetWindowsHookEx) sometimes get tagged by antivirus though.
    29. userbinator ◴[] No.43528259{4}[source]
    It's also from a time when corporate mass surveillance was universally hated, software was not a service, and "phoning home" or requiring an Internet connection considered unacceptable to the majority of users.