| almost all executable installers (and self-extractors as well
| as “portable” applications too) for Windows have a well-known
| (trivial, trivial to detect and trivial to exploit) vulnerability:
IExpress (<https://msdn.microsoft.com/en-us/library/dd346760.aspx>)
creates executable installers [°] or self-extracting archives for
Windows by embedding a .CAB archive and some strings as resources
into a copy of the program %SystemRoot%System32WExtract.exe.
These self-extracting archives/executable installers, especially
those made by Microsoft [‘] (available in the Microsoft download
center or distributed per Windows…
the executable installers python-3.5.1-webinstall.exe and
python-3.5.1.exe available on
<https://www.python.org/downloads/windows/> load and execute
multiple DLLs from their “application directory”.
The project has been abruptly killed by the developers without any
clear explanation. There’s something fishy and it cannot be trusted
anymore.
Spend your time and energy on forks like CipherShed or VeraCrypt!
AFAIK, TrueCrypt 7.2 is only capable of decryption. It is provided so
that users can migrate their data to another system.
In May of last year, I reported to CryptoGuard that their cryptography
wasn’t guarding against chosen-ciphertext attacks, which is the sort of
oversight that would allow me to intercept a ciphertext message then keep
feeding it back into the decryption process with slight alterations until I
recovered the plaintext.
The Metabrik Platform bind togother a classic Shell with a Perl
interpreter as a REPL (Read-Eval-Print-Loop) and a ton of small Briks.
Briks are reusable…