<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4484015730406869163</atom:id><lastBuildDate>Wed, 28 Aug 2024 19:22:30 +0000</lastBuildDate><category>Botnets</category><category>Malware Analysis</category><category>cyber criminals</category><category>downloaders</category><category>4shared</category><category>Anti-virus tests</category><category>Cloud Security</category><category>Cloud security issues</category><category>Depositefiles</category><category>Digital Forensics</category><category>Easy-share</category><category>Filefactory</category><category>Fileserve</category><category>Gigasize</category><category>Hotfile</category><category>IP fragmentation</category><category>Letitbit</category><category>MEDIAFIRE</category><category>MEGA</category><category>PUTLOCKER</category><category>Penetration Testing</category><category>Rapidshare</category><category>SAP security</category><category>Sendspace</category><category>Uploading</category><category>XSS Attacks</category><category>anti-malware threats</category><category>atm hack</category><category>card fraud</category><category>ccent</category><category>ccent venezuela</category><category>ccna</category><category>cisco venezuela</category><category>crimeware</category><category>curso ccent</category><category>curso ccna</category><category>curso cisco</category><category>curso cisco venezuela</category><category>curso redes</category><category>curso redes cisco</category><category>curso redes venezuela</category><category>curso suiches</category><category>download manager</category><category>flash exploit</category><category>http botnets</category><category>log visualization</category><category>malicious documents</category><category>mipony</category><category>mipony v2.1.2</category><category>modelo osi</category><category>nmap</category><category>office malware</category><category>officecat</category><category>rogue av</category><category>sandbox</category><category>social engineering</category><category>static analysis</category><category>suiches cisco</category><category>tcp/ip</category><category>0-day market</category><category>0-day research</category><category>0day attacks</category><category>0day php vulnerability</category><category>419 scam</category><category>ABAP Executable Manipulation</category><category>ABAP Rootkits</category><category>ACSServer.exe</category><category>ARM</category><category>ASLR</category><category>AV comparison</category><category>AV dead</category><category>AV detection</category><category>AV detection rate</category><category>AVC voting machine</category><category>Android attack</category><category>Anti-phishing</category><category>Asda hack</category><category>Aurora</category><category>Automated Dynamic Testing</category><category>Automated Exploitation</category><category>Automated Static Testing</category><category>BINTEXT</category><category>Blackberry Security</category><category>Bredolab</category><category>CORE-2008-01035</category><category>CORE-2008-0826</category><category>CORE-2009-06256</category><category>Cloud Computing</category><category>Code Signing</category><category>Cutwail botnet</category><category>Cyber Espionage</category><category>CyberCrime</category><category>CyberTerror</category><category>CyberWar</category><category>Cyberwars</category><category>DEPlib automatic instruction</category><category>DIY toolkits</category><category>Dangerous virus</category><category>Davix log management tools</category><category>Defacement</category><category>Diebold ATM compromise</category><category>E-capsule PrivateSafe</category><category>EV SSL</category><category>Electronic terrorism</category><category>EnCase</category><category>Encoding attacks</category><category>Etisalat mobile hack</category><category>Ettercap</category><category>Exploitation</category><category>Exploiting RIA</category><category>FTK</category><category>File and Disk Analysis Tools</category><category>Financial Web Applications</category><category>FireCAT</category><category>Firefox Auditing Tools</category><category>FlexiSpy</category><category>Fuzzing Tools</category><category>GPS tracking</category><category>Hackers news</category><category>Hacking Cloud</category><category>Heuristic-based</category><category>ICMP replies</category><category>ICQ hack</category><category>IDN spoofing</category><category>IE attack</category><category>IE exploitation</category><category>IE zone elevation</category><category>ILook Investigator</category><category>IM hack</category><category>IM vulnerability</category><category>IOS next generation</category><category>IPS shortcomings</category><category>ISN profile</category><category>ISSAF</category><category>IaaS</category><category>Information disclosure</category><category>Infrastructure as a service</category><category>Initial steps in forensics</category><category>Injection Attack</category><category>Investigator Toolkit</category><category>IpMorph</category><category>Javascript Crafted URL</category><category>MIME type detection</category><category>MSN Messenger Password</category><category>MSN hack</category><category>MSRPC Alter Context</category><category>MXI Stealth USB</category><category>Malware Tools</category><category>Massive defacements</category><category>Memory Imaging</category><category>Metadata Extraction</category><category>Mobile Spy</category><category>Mobile Spyware</category><category>NYSE attack</category><category>Network Auditing Utilities</category><category>OSSTMM</category><category>PDA Forensics</category><category>PED</category><category>PED tampering</category><category>PEiD Tool</category><category>PEiD signatures</category><category>PaaS</category><category>Phone Number Farming</category><category>Phonesnoop</category><category>Plaintext Storage in Memory</category><category>Platform as a Service</category><category>Polymorphic Viruses</category><category>Privilege Escalation</category><category>Proxy Debuggers</category><category>RCE</category><category>RFID</category><category>ROP functions</category><category>Ring2</category><category>SAP Cross Site Scripting</category><category>SAP Penetration Attacks</category><category>SAP Penetration Testing</category><category>SAP RFC</category><category>SAP SQL injection</category><category>SAP architecture</category><category>SAP exploit</category><category>SAP infrastructure</category><category>SAP platform</category><category>SAP risk</category><category>SAP systems</category><category>SAP threats</category><category>SAP vulnerabilities</category><category>SEIM</category><category>SEM</category><category>SIM</category><category>SIM Forensics</category><category>SIP hack</category><category>SMB Session Mixing</category><category>SSL vs EV SSL</category><category>SWF security assessment</category><category>SaaS</category><category>SaaS security</category><category>Sensitive user data expose</category><category>SharePoint Google</category><category>SharePoint ISAPI Registry</category><category>SharePoint Nmap</category><category>SharePoint Regex</category><category>Signature-based</category><category>SinFP</category><category>Skeptic</category><category>SoftICE (Reversing)</category><category>Software as a Service</category><category>SysInternals</category><category>TCP Urgent Pointer</category><category>TCP headers</category><category>TNS listenser security</category><category>ThreatExpert</category><category>UTF-7 security</category><category>UTF-8 security</category><category>Underground economy</category><category>Unibomber XSS tool</category><category>VirusScan</category><category>Vulnerability Assessment</category><category>Wal-mart hack</category><category>Watcher security tool</category><category>Web Relay or Proxy Auditors</category><category>Web based malware detection</category><category>Webserver misconfiguration</category><category>X-Ways MSN</category><category>XSS Protection</category><category>XSS Threat</category><category>XSS Vulnerability</category><category>Xprobe2</category><category>Yahoo hack</category><category>Zero Wine malware analysis</category><category>Zone-h statistics evaluation</category><category>actionscript hack</category><category>actionscript testing</category><category>activex decoder</category><category>adware</category><category>aircrack-ng suite</category><category>alternate identity</category><category>anonymous</category><category>anti-censorship</category><category>anti-debugging techniques</category><category>anti-forensic techniques</category><category>anti-virtualization</category><category>anti-virus ineffectiveness</category><category>aol phishing</category><category>api hooking</category><category>api thief</category><category>api tracing</category><category>application security testing</category><category>application vulnerabilities</category><category>assess oracle platform</category><category>attack vmware</category><category>attack voip</category><category>automated vulnerability testing</category><category>best anti-virus solution</category><category>bgp attacks</category><category>bgp mitm</category><category>bgp protocol vulnerabilities</category><category>bgp routing hack</category><category>binary diff</category><category>blackhat mitm ssl</category><category>blended threats</category><category>blue box</category><category>buffer overflows</category><category>business intelligence</category><category>bypass ids/ips</category><category>bypassing the IPS</category><category>carderplant</category><category>carders</category><category>carding</category><category>cellphone hack</category><category>cellphone network breach</category><category>chain of custody</category><category>chip and pin security</category><category>cisco</category><category>cisco backdoor</category><category>cisco exploits</category><category>cisco ios exploit</category><category>cisco ios ips</category><category>cisco ios rootkits</category><category>cisco nmap</category><category>cisco router compromise</category><category>cisco tcl backdoor</category><category>cloak</category><category>cloud IDS</category><category>cloud IPS</category><category>cloud assessment</category><category>cloud av scanning</category><category>cloud hack</category><category>cloud malicious url</category><category>cloud malware</category><category>cloud rbl</category><category>cloud spam</category><category>cloud taxonomy</category><category>conceal identity</category><category>conficker algorithm</category><category>conficker analysis</category><category>conficker c</category><category>conficker removal</category><category>conficker samples</category><category>conficker variant</category><category>conficker worm</category><category>consumer security</category><category>content filtering</category><category>control social network</category><category>corporate threat</category><category>counterfeited passport</category><category>counterfeiting payment systems</category><category>crack application</category><category>crack crypto system</category><category>crack encrypted filesystem</category><category>crack sigtran</category><category>crack wep</category><category>crack wpa</category><category>credit card theft</category><category>credit crunch</category><category>cryptors</category><category>cwsandbox</category><category>cyber attacks</category><category>cyber weapon</category><category>cyberwarfare</category><category>dagger</category><category>dangerous tcp vulnerability</category><category>darkmarket</category><category>data stealing malware</category><category>data theft</category><category>davix</category><category>debuggers</category><category>debugging techniques</category><category>defeat os detection</category><category>defeat os fingerprinting</category><category>delitos informaticos</category><category>design flaws</category><category>digial reputation</category><category>digital domination</category><category>disassembler</category><category>disposable email</category><category>dns</category><category>dns poisoning</category><category>downup conficker</category><category>dynamic analysis</category><category>e-commerce website</category><category>eavesdropping tor traffic</category><category>eeprom password</category><category>electronic disobedience</category><category>email attacks</category><category>email-borne threats</category><category>embedded system side channel attack</category><category>emulation</category><category>encrypted PIN</category><category>encrypted messages</category><category>encryption</category><category>enterprise security</category><category>escalating privileges</category><category>espionage office documents</category><category>excel</category><category>exploit hardened php server</category><category>exploit hardened webserver</category><category>exploit ipv6</category><category>exploit market</category><category>facebook accounts</category><category>facebook hack</category><category>fake anti.virus</category><category>fake av</category><category>false alarm</category><category>financial firms recession</category><category>firewall and ips bypass</category><category>flash assessment</category><category>flashfire framework</category><category>forensic tools</category><category>forensics investigation</category><category>formal verification</category><category>frageroute</category><category>free wifi</category><category>fuzz testing</category><category>fuzzing techniques</category><category>gsm cracking</category><category>gsm decoder</category><category>gsm mobile hacking</category><category>gsm security</category><category>hack cisco</category><category>hack cryptographic technology</category><category>hack moss</category><category>hack rich internet applications</category><category>hack sharepoint</category><category>hack telecom backbones</category><category>hack wss</category><category>hackers rule the economy</category><category>hacking SAP</category><category>hacking smartgrid</category><category>hacking vmware</category><category>hermit</category><category>hijack youtube traffic</category><category>hooking techniques</category><category>idefense jsunpack</category><category>idefense vcp</category><category>ids evasion</category><category>incident reporting</category><category>information management</category><category>information security visualization</category><category>information stealing malware</category><category>inline hooks</category><category>instant messaging hack</category><category>intelligence monitoring</category><category>internet downtime</category><category>internet explorer exploit</category><category>internet explorer vulnerabilities</category><category>intrusion detection limitations</category><category>intrusion prevention system bypass</category><category>ios ips</category><category>ios shellcode</category><category>ios threats</category><category>ios vulnerabilities</category><category>ips bypass</category><category>ips evasion techniques</category><category>ipv6 attack toolkit</category><category>ipv6 penetration</category><category>ipv6 vulnerabilities</category><category>it</category><category>javascript decoder</category><category>javascript unpacker</category><category>k-ary malware</category><category>kernel-level monitoring</category><category>kido worm</category><category>kill internet</category><category>kismet</category><category>law in cyberspace</category><category>leyes</category><category>log analysis</category><category>log centralization</category><category>log management</category><category>malicious PDF</category><category>malicious document structure</category><category>malicious office documents</category><category>malware affiliate</category><category>malware attack lifecycle</category><category>malware detection vs decision</category><category>malware distribution channel</category><category>malware inspection techniques</category><category>malware lab</category><category>malware legal issues</category><category>malware obfuscation techniques</category><category>malware static analysis</category><category>malware threats</category><category>map of science</category><category>mass-email attacks</category><category>metadata analyzer</category><category>metasploit oracle</category><category>military spy</category><category>mobile backdoor</category><category>mobile evasdropping</category><category>mobile phone sniffing</category><category>modbus security</category><category>monitor social network</category><category>multi-layered threats</category><category>netstumbler</category><category>nmap oracle</category><category>nmap scan</category><category>non-executable memory</category><category>non-unicode attacks</category><category>office macro security</category><category>office malscanner</category><category>office malware analysis</category><category>office shellcode</category><category>officemalscanner</category><category>offvis</category><category>online bank fraud</category><category>operation cardkeeper</category><category>operation firewall</category><category>oracle penetration testing</category><category>oracle security</category><category>oracle security assessment</category><category>oracle testing methodology</category><category>p0f</category><category>packers</category><category>paid exploit</category><category>paid poc</category><category>paid vulnerability</category><category>pakistan telecom youtube</category><category>pay phones</category><category>pdf exploit</category><category>pdf scanner</category><category>penetration smartgrid network</category><category>pharming</category><category>phishing</category><category>php exploit</category><category>php vulnerabilities</category><category>phreaking</category><category>pin entry device</category><category>pirate bay case</category><category>power em traces</category><category>powerpoint</category><category>prevent bgp attack</category><category>problems in tor network</category><category>process monitoring</category><category>protectors</category><category>public key cracking</category><category>reconnaissance tools</category><category>remote chat shellcode hack</category><category>ret2lib exploit</category><category>return-oriented programming</category><category>reverse engineering</category><category>reversing malware</category><category>risk management</category><category>rop</category><category>russian cybercrime</category><category>sandbox conficker worm</category><category>scada hacks</category><category>scada network</category><category>scada penetration testing</category><category>scada security</category><category>scada security assessment</category><category>scada security compliance</category><category>scada security tools</category><category>scan cisco</category><category>scan ipv6 network</category><category>scan ss7 networks</category><category>science map</category><category>scientific visualization</category><category>sctp scanning</category><category>sctp stack fingerprinting</category><category>secure cryptographic hash functions</category><category>secure https</category><category>secure smartgrid components</category><category>security breaches</category><category>security in smartgrid</category><category>session hijacking tor</category><category>shadowcrew</category><category>shellcode detection</category><category>side channel attack</category><category>side channel threat countermeasures</category><category>sigtran</category><category>sigtran hacking</category><category>smartcard protocol</category><category>smartcard security</category><category>smartcard side channel</category><category>smartgrid</category><category>smartgrid technology</category><category>smashing the stack</category><category>smb evasion</category><category>smiley hack</category><category>snosoft</category><category>social media privacy</category><category>social network malware</category><category>social network threats</category><category>sockstress tool</category><category>sockstress vulnerability</category><category>sparse</category><category>spyware</category><category>ss7 hacking</category><category>ssdt hooks</category><category>ssl attack</category><category>static code analysis</category><category>stealing vmware guest</category><category>stock market hackers</category><category>stock market virus</category><category>surveillance</category><category>system monitoring</category><category>tcp fragmentation</category><category>tcp vulnerability</category><category>threats in smartgrid technology</category><category>timeouts</category><category>timing analysis</category><category>tor anonymity</category><category>tor attack</category><category>tor mitm attack</category><category>tor security</category><category>tor threats</category><category>tor vulnerabilities</category><category>trojan</category><category>trojan infected document</category><category>twitter accounts</category><category>unicode security</category><category>vb macros</category><category>verisign evssl</category><category>virtualization</category><category>virtualization hack</category><category>virtualization security</category><category>virus</category><category>visual spoofing</category><category>visualization effectiveness</category><category>visualization process</category><category>visualize airwaves</category><category>vmware exploit</category><category>vmware mitigation</category><category>vmware root</category><category>vmware security</category><category>vmware vulnerability</category><category>vulnerability analysis</category><category>vulnerability research</category><category>vulnerable internet</category><category>wabisabilabi</category><category>wepawet</category><category>white collar</category><category>whole science</category><category>wireless recon</category><category>wireless visualization</category><category>word</category><category>world of science</category><category>xbox 360 backdoor</category><category>youtube bgp hack</category><category>zdi initiatives</category><category>zero day market</category><title>Ethical-Hacker.net Blog - A Security Driven Knowledge</title><description></description><link>http://ethicalhackernet.blogspot.com/</link><managingEditor>noreply@blogger.com (S. Ali)</managingEditor><generator>Blogger</generator><openSearch:totalResults>71</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-8437984942657722685</guid><pubDate>Sat, 26 Apr 2014 14:52:00 +0000</pubDate><atom:updated>2014-04-26T10:26:04.615-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ccent</category><category domain="http://www.blogger.com/atom/ns#">ccent venezuela</category><category domain="http://www.blogger.com/atom/ns#">ccna</category><category domain="http://www.blogger.com/atom/ns#">cisco venezuela</category><category domain="http://www.blogger.com/atom/ns#">curso ccent</category><category domain="http://www.blogger.com/atom/ns#">curso ccna</category><category domain="http://www.blogger.com/atom/ns#">curso cisco</category><category domain="http://www.blogger.com/atom/ns#">curso cisco venezuela</category><category domain="http://www.blogger.com/atom/ns#">curso redes</category><category domain="http://www.blogger.com/atom/ns#">curso redes cisco</category><category domain="http://www.blogger.com/atom/ns#">curso redes venezuela</category><category domain="http://www.blogger.com/atom/ns#">curso suiches</category><category domain="http://www.blogger.com/atom/ns#">modelo osi</category><category domain="http://www.blogger.com/atom/ns#">suiches cisco</category><category domain="http://www.blogger.com/atom/ns#">tcp/ip</category><title>Curso Infraestructura de Dispositivos Cisco - Nivel Asociado (CCNA-R&amp;S) v2</title><description>&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #330099;&quot;&gt;Curso Infraestructura de Dispositivos Cisco - Nivel Asociado (CCNA-R&amp;amp;S) v2 &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;Curso con &lt;b&gt;fuerte orientación
práctica&lt;/b&gt;, Infraestructura de Dispositivos Cisco - Nivel Asociado, se centra
en proporcionar las habilidades y conocimientos necesarios para instalar,
operar y solucionar problemas en una infraestructura LAN/WAN de una empresa de
pequeño a mediano tamaño, incluyendo la configuración de Switches y Routers
Cisco , la conexión a una red WAN y aplicación de seguridad de la red . &lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;No es un curso introductorio. Está
diseñado para aquellos alumnos que tienen un firme entendimiento de los
fundamentos de redes de datos, han tenido la exposición a las direcciones IP y
están familiarizados con la interfaz de Cisco IOS de línea de comandos. Para
aprovechar al máximo este curso, se recomienda que los alumnos tienen las
siguientes habilidades y conocimientos pre-requisito:&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin: 0cm 0cm 0pt; text-align: justify; text-indent: 0cm;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;Operar
una LAN de tamaño mediano con múltiples switches, soporte VLANs, trunking y
spanningtree&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin: 0cm 0cm 0pt; text-align: justify; text-indent: 0cm;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;Solucionar
problemas de conectividad IP&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin: 0cm 0cm 0pt; text-align: justify; text-indent: 0cm;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;Configurar
y solucionar problemas de EIGRP en el entorno IPv4, y configurar EI GRP para
IPv6 Configurar y solucionar problemas de OSPF en el entorno IPv4, y configurar
OSPF para IPv6.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin: 0cm 0cm 0pt; text-align: justify; text-indent: 0cm;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;Definir
las características, funciones y componentes de una red WAN&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin: 0cm 0cm 0pt; text-align: justify; text-indent: 0cm;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;Describir
SNMP, Syslog, Netflow y administrar configuraciones de dispositivos Cisco IOS,
imágenes y licencias&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;b&gt;Dirigido: &lt;/b&gt;Técnicos, Profesionales y público en general. &lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;El curso es abierto, tanto para
personal de empresas, como particulares, son &lt;b&gt;BIENVENIDOS&lt;/b&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;b&gt;Duración:&lt;/b&gt; 40 horas, 5 días. &lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;b&gt;Requisitos:&lt;/b&gt; Tener una certificación CCENT o haber asistido al
curso.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;line-height: normal; margin-bottom: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;Para contactos Latinoamerica: &lt;a href=&quot;http://www.ethical-hacker.net/&quot;&gt;www.ethical-hacker.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: red; font-family: Arial;&quot;&gt;&lt;strong&gt;NUESTROS&amp;nbsp;FACILITADORES ESTAN EN LA LISTA DE LOS MEJORES INSTRUCTORES DE CISCO.&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://ethicalhackernet.blogspot.com/2014/04/infraestructura-de-dispositivos-cisco.html</link><author>noreply@blogger.com (Rafael Maita)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-2774262841434731501</guid><pubDate>Sat, 26 Apr 2014 14:47:00 +0000</pubDate><atom:updated>2014-04-26T10:18:55.888-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">4shared</category><category domain="http://www.blogger.com/atom/ns#">Depositefiles</category><category domain="http://www.blogger.com/atom/ns#">download manager</category><category domain="http://www.blogger.com/atom/ns#">downloaders</category><category domain="http://www.blogger.com/atom/ns#">Easy-share</category><category domain="http://www.blogger.com/atom/ns#">Filefactory</category><category domain="http://www.blogger.com/atom/ns#">Fileserve</category><category domain="http://www.blogger.com/atom/ns#">Gigasize</category><category domain="http://www.blogger.com/atom/ns#">Hotfile</category><category domain="http://www.blogger.com/atom/ns#">Letitbit</category><category domain="http://www.blogger.com/atom/ns#">MEDIAFIRE</category><category domain="http://www.blogger.com/atom/ns#">MEGA</category><category domain="http://www.blogger.com/atom/ns#">mipony</category><category domain="http://www.blogger.com/atom/ns#">mipony v2.1.2</category><category domain="http://www.blogger.com/atom/ns#">PUTLOCKER</category><category domain="http://www.blogger.com/atom/ns#">Rapidshare</category><category domain="http://www.blogger.com/atom/ns#">Sendspace</category><category domain="http://www.blogger.com/atom/ns#">Uploading</category><title>Mipony v2.1.3 Clean Installer / Mipony v2.1.3 Instalador en Limpio</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.mipony.net/images/logo_principal.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.mipony.net/images/logo_principal.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;es-x-mtfrom-en&quot;&gt;Mipony es un administrador de descargas,  diseñado especialmente para descargar automáticamente desde sitios de  hosting gratuito como Rapidshare, Mega, MediaFire, Netload, etc.&lt;/span&gt;&lt;span class=&quot;es-x-mtfrom-en&quot;&gt;Con este administrador de descargas disfrutará de mucha más comodidad a la  hora de descargar archivos. Mipony se encarga de todo.&lt;/span&gt;&lt;span class=&quot;es-x-mtfrom-en&quot;&gt;Va automáticamente al sitio web que recibe el archivo, espera el tiempo  necesario e inicia la descarga de muchos archivos, uno después de otro,  automáticamente.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;es-x-mtfrom-en&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;span class=&quot;gI&quot;&gt;&lt;span class=&quot;go a1H&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div class=&quot;primera_columna&quot;&gt;
&lt;b&gt;Caracterísitcas principales de Mipony:    &lt;/b&gt;&lt;br /&gt;
&lt;ul class=&quot;primera_columna_infomacion&quot;&gt;
&lt;li&gt;Descarga de ficheros AUTOMÁTICA.&lt;/li&gt;
&lt;li&gt;Optimiza al máximo tu conexión.&lt;/li&gt;
&lt;li&gt;Funciona con y sin cuentas PREMIUM.&lt;/li&gt;
&lt;li&gt;NAVEGADOR web integrado.&lt;/li&gt;
&lt;li&gt;Control remoto.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div class=&quot;segunda_columna&quot;&gt;
&lt;b&gt;Sitios soportados&lt;/b&gt;:   PUTLOCKER, Rapidshare, Hotfile, Easy-share, Gigasize, MEDIAFIRE,  Depositefiles, Fileserve, Filefactory, Uploading, 4shared, Letitbit,  Sendspace, MEGA,...&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:HyphenationZone&gt;21&lt;/w:HyphenationZone&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;ES-VE&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;--&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;false&quot;
  DefSemiHidden=&quot;false&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;371&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footer&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of figures&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope address&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope return&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;line number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;page number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of authorities&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;macro&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;toa heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Closing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Signature&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Message Header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Salutation&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Date&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Note Heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Block Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Hyperlink&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;FollowedHyperlink&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Document Map&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Plain Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;E-mail Signature&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Top of Form&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Bottom of Form&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal (Web)&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Acronym&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Address&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Cite&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Code&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Definition&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Keyboard&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Preformatted&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Sample&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Typewriter&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Variable&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Table&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation subject&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;No List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Contemporary&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Elegant&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Professional&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Balloon Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Theme&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; QFormat=&quot;true&quot;
   Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;41&quot; Name=&quot;Plain Table 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;42&quot; Name=&quot;Plain Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;43&quot; Name=&quot;Plain Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;44&quot; Name=&quot;Plain Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;45&quot; Name=&quot;Plain Table 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;40&quot; Name=&quot;Grid Table Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;Grid Table 1 Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;Grid Table 6 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;Grid Table 7 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;List Table 1 Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;List Table 6 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;List Table 7 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 6&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Tabla normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin-top:0cm;
 mso-para-margin-right:0cm;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0cm;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-fareast-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt; &lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Bueno después de toda esta introducción si no conocías a MIPONY seguro que estás pensando voy corriendo a descargarlo de su sitio web. Que sucede?&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Bueno que cuando vayas a descargar a mipony observaras que la descarga es súper rápida, es de &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;200k el tamaño del EXE que te bajas. Eso es como un lanzador que instala publicidad y otra basura de propaganda mientas realiza la descarga del instalador real que pesa poco menos de 6 megas.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
He capturado ese instalador para que realices la instalación del mejor gestor de descarga en limpio y no sufras con el instalador principal.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
De hecho puedes intentar bajarte ese lanzador desde la web oficial y checar tu antivirus, algunos te bloquean ese lanzador ya que instala mucha propaganda.&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;a href=&quot;http://bit.ly/mipony213&quot; target=&quot;_blank&quot;&gt;Descargar: &lt;span class=&quot;invisible&quot;&gt;http://&lt;/span&gt;&lt;span class=&quot;js-display-url&quot;&gt;bit.ly/mipony213&lt;/span&gt;&lt;span class=&quot;tco-ellipsis&quot;&gt;&lt;span class=&quot;invisible&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;tco-ellipsis&quot;&gt;&lt;span class=&quot;invisible&quot;&gt;Gracias... &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.virustotal.com/es/file/9f5847a35e7eabaa6b1d31ff6081e0a51a1c184173c3cb08f8e280b6657b77bf/analysis/1398522607/&quot; target=&quot;_blank&quot;&gt;VIRUSTOTAL REPORTE&lt;/a&gt;&lt;/div&gt;
</description><link>http://ethicalhackernet.blogspot.com/2014/04/mipony-v213-clean-installer-mipony-v213.html</link><author>noreply@blogger.com (Rafael Maita)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-3163836041744383558</guid><pubDate>Fri, 14 Mar 2014 21:09:00 +0000</pubDate><atom:updated>2014-03-14T16:39:01.178-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ccent</category><category domain="http://www.blogger.com/atom/ns#">ccent venezuela</category><category domain="http://www.blogger.com/atom/ns#">ccna</category><category domain="http://www.blogger.com/atom/ns#">cisco venezuela</category><category domain="http://www.blogger.com/atom/ns#">curso ccent</category><category domain="http://www.blogger.com/atom/ns#">curso ccna</category><category domain="http://www.blogger.com/atom/ns#">curso cisco</category><category domain="http://www.blogger.com/atom/ns#">curso cisco venezuela</category><category domain="http://www.blogger.com/atom/ns#">curso redes</category><category domain="http://www.blogger.com/atom/ns#">curso redes cisco</category><category domain="http://www.blogger.com/atom/ns#">curso redes venezuela</category><category domain="http://www.blogger.com/atom/ns#">curso suiches</category><category domain="http://www.blogger.com/atom/ns#">modelo osi</category><category domain="http://www.blogger.com/atom/ns#">suiches cisco</category><category domain="http://www.blogger.com/atom/ns#">tcp/ip</category><title>Curso Infraestructura de Dispositivos Cisco Nivel Entrada - CCENT</title><description>&lt;div align=&quot;justify&quot;&gt;
Curso Infraestructura de Dispositivos Cisco Nivel Entrada (CCENT)&lt;br /&gt;
        Curso con &lt;strong&gt;fuerte orientación práctica&lt;/strong&gt;, 
Infraestructura de Dispositivos Cisco (ccna 1),   está dirigido a 
aquellas personas que deseen, dar sus primeros pasos   como técnicos de 
Telecomunicaciones en tecnología Cisco con el objetivo   de poder 
instalar, mantener y solucionar problemas en redes pequeñas. &lt;/div&gt;
&lt;div align=&quot;justify&quot;&gt;
Con este entrenamiento  dictado por instructores certificados, el estudiante aprenderá, entre otros conocimientos a: &lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Construir una red simple&lt;/li&gt;
&lt;li&gt;Modelo OSI &lt;/li&gt;
&lt;li&gt;Subredes&lt;/li&gt;
&lt;li&gt;Identificación de Tramas&lt;/li&gt;
&lt;li&gt;LANs de Ethernet&lt;/li&gt;
&lt;li&gt;LANs inalámbricas &lt;/li&gt;
&lt;li&gt;Redes Wide area networks (WAN) &lt;/li&gt;
&lt;li&gt;Fundamentos de redes y router &lt;/li&gt;
&lt;li&gt;Configuración de Suiches&lt;/li&gt;
&lt;li&gt;Configuración de Routers&lt;/li&gt;
&lt;li&gt;Configuración de NAT y PAT &lt;/li&gt;
&lt;li&gt;Configuración de CDP&lt;/li&gt;
&lt;li&gt;Configuración DHCP server&lt;/li&gt;
&lt;li&gt;Configuración rutas estáticas&lt;/li&gt;
&lt;li&gt;Rutas default &lt;/li&gt;
&lt;li&gt;Configuración Protocolo Enrutamiento&lt;/li&gt;
&lt;li&gt;PPP, Frame Relay, HDLC, RIP, TFTP Telnet, SSH, accesos seguros &lt;/li&gt;
&lt;li&gt;Configuración de protocolos de WAN&lt;/li&gt;
&lt;/ul&gt;
&lt;div align=&quot;justify&quot;&gt;
 El curso ha sido   diseñado para personas 
sin conocimientos previos en Redes o con niveles   básicos de manejo de 
PC; personas interesadas en iniciar adecuadamente   una carrera en el 
campo de Telecomunicaciones con la opción de   certificarse 
internacionalmente como especialista &lt;strong&gt;CCENT&lt;/strong&gt;. &lt;/div&gt;
&lt;strong&gt;Dirigido: &lt;/strong&gt;Técnicos, Profesionales y público en general. &lt;br /&gt;
        El curso es abierto, tanto para personal de empresas, como partículares, son &lt;strong&gt;BIENVENIDOS&lt;/strong&gt;.&lt;br /&gt;
        &lt;strong&gt;Duración:&lt;/strong&gt; 5 sesiones. &lt;br /&gt;
        &lt;strong&gt;Requisitos:&lt;/strong&gt; Conocimientos básicos de computación.&lt;br /&gt;
        &lt;br /&gt;
        &lt;a href=&quot;http://ethical-hacker.net/contacto.htm&quot; target=&quot;_blank&quot;&gt;Para adquirirlo pide información  en contacto…&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;Para Venezuela y Toda LlatinoAmerica.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;Nos especializamos en ofrecerle al estudiante apoyo para la certificación.&lt;br /&gt;


 Todos los centros se enfocan en darte el curso y hasta allí llega su 
meta. Nosotros nos enfocamos en ayudar a las personas para que consigan 
pasar su examen de certificación. &lt;/span&gt; &lt;span style=&quot;font-family: arial,helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
 Las personas que desean cambiar de puesto de trabajo o tener una mayor 
remuneración económica en sus salarios, están prácticamente obligadas 
hoy en día en tener las certificaciones internacionales para que sean 
tomadas en cuenta en la evaluación de los CV y la certificación abre 
muchas puertas, ya que la mayoría de las personas hacen un curso y hasta
 allí llegan, no siguen&amp;nbsp; con el paso más importante que es el de 
certificarse. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;Podemos ofrecerte varias alternativas basadas en el horario disponible para tener tu entrenamiento y tu presupuesto.&lt;br /&gt;

&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;Eres tú solo o tienes algún grupo de amigos con el cual quieran hacer el mismo curso?&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;

&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;Las
 certificaciones de cisco cambiaron, podemos ayudarte hacer un plan de 
carrera según tus gustos y necesidades para que tengas una meta clara, 
tangible y a bajo costo.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;Siempre
 digo a mis estudiantes las certificaciones hoy en día son una 
inversión, ya que al obtener la primera vas a ver que tu vida cambia que
 no vas a dejar de certificarte.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;En
 caso de que seas tú solo, podemos ofrecerte la modalidad 1a1: sesiones 
individuales en la cual conocerás el mundo de redes de forma particular 
con tu instructor, estas sesiones podrán ser presenciales o remotas (en 
linea) dependiendo de tu tiempo libre y del instructor que te toque.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&amp;nbsp;        </description><link>http://ethicalhackernet.blogspot.com/2014/03/curso-infraestructura-de-dispositivos.html</link><author>noreply@blogger.com (Rafael Maita)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-2358429478372332268</guid><pubDate>Fri, 14 Mar 2014 20:46:00 +0000</pubDate><atom:updated>2014-03-14T16:23:08.231-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">4shared</category><category domain="http://www.blogger.com/atom/ns#">Depositefiles</category><category domain="http://www.blogger.com/atom/ns#">download manager</category><category domain="http://www.blogger.com/atom/ns#">downloaders</category><category domain="http://www.blogger.com/atom/ns#">Easy-share</category><category domain="http://www.blogger.com/atom/ns#">Filefactory</category><category domain="http://www.blogger.com/atom/ns#">Fileserve</category><category domain="http://www.blogger.com/atom/ns#">Gigasize</category><category domain="http://www.blogger.com/atom/ns#">Hotfile</category><category domain="http://www.blogger.com/atom/ns#">Letitbit</category><category domain="http://www.blogger.com/atom/ns#">MEDIAFIRE</category><category domain="http://www.blogger.com/atom/ns#">MEGA</category><category domain="http://www.blogger.com/atom/ns#">mipony</category><category domain="http://www.blogger.com/atom/ns#">mipony v2.1.2</category><category domain="http://www.blogger.com/atom/ns#">PUTLOCKER</category><category domain="http://www.blogger.com/atom/ns#">Rapidshare</category><category domain="http://www.blogger.com/atom/ns#">Sendspace</category><category domain="http://www.blogger.com/atom/ns#">Uploading</category><title>Mipony v2.1.2 Clean Installer / Mipony v2.1.2 Instalador en Limpio</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.mipony.net/images/logo_principal.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.mipony.net/images/logo_principal.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;es-x-mtfrom-en&quot;&gt;Mipony es un administrador de descargas, 
diseñado especialmente para descargar automáticamente desde sitios de 
hosting gratuito como Rapidshare, Mega, MediaFire, Netload, etc.&lt;/span&gt;&lt;span class=&quot;es-x-mtfrom-en&quot;&gt;Con
 este administrador de descargas disfrutará de mucha más comodidad a la 
hora de descargar archivos. Mipony se encarga de todo.&lt;/span&gt;&lt;span class=&quot;es-x-mtfrom-en&quot;&gt;Va
 automáticamente al sitio web que recibe el archivo, espera el tiempo 
necesario e inicia la descarga de muchos archivos, uno después de otro, 
automáticamente.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;es-x-mtfrom-en&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;gI&quot;&gt;&lt;span class=&quot;go a1H&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;primera_columna&quot;&gt;
&lt;b&gt;Caracterísitcas principales de Mipony:
   &lt;/b&gt;&lt;br /&gt;
&lt;ul class=&quot;primera_columna_infomacion&quot;&gt;
&lt;li&gt;Descarga de ficheros AUTOMÁTICA.&lt;/li&gt;
&lt;li&gt;Optimiza al máximo tu conexión.&lt;/li&gt;
&lt;li&gt;Funciona con y sin cuentas PREMIUM.&lt;/li&gt;
&lt;li&gt;NAVEGADOR web integrado.&lt;/li&gt;
&lt;li&gt;Control remoto.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div class=&quot;segunda_columna&quot;&gt;
&lt;b&gt;Sitios soportados&lt;/b&gt;:
   PUTLOCKER, Rapidshare, Hotfile, Easy-share, Gigasize, MEDIAFIRE, 
Depositefiles, Fileserve, Filefactory, Uploading, 4shared, Letitbit, 
Sendspace, MEGA,...&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:HyphenationZone&gt;21&lt;/w:HyphenationZone&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;ES-VE&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;--&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;false&quot;
  DefSemiHidden=&quot;false&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;371&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footer&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of figures&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope address&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope return&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;line number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;page number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of authorities&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;macro&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;toa heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Closing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Signature&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Message Header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Salutation&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Date&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Note Heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Block Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Hyperlink&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;FollowedHyperlink&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Document Map&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Plain Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;E-mail Signature&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Top of Form&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Bottom of Form&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal (Web)&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Acronym&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Address&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Cite&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Code&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Definition&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Keyboard&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Preformatted&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Sample&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Typewriter&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Variable&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Table&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation subject&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;No List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Contemporary&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Elegant&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Professional&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Balloon Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Theme&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; QFormat=&quot;true&quot;
   Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;41&quot; Name=&quot;Plain Table 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;42&quot; Name=&quot;Plain Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;43&quot; Name=&quot;Plain Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;44&quot; Name=&quot;Plain Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;45&quot; Name=&quot;Plain Table 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;40&quot; Name=&quot;Grid Table Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;Grid Table 1 Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;Grid Table 6 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;Grid Table 7 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;List Table 1 Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;List Table 6 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;List Table 7 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 6&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Tabla normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin-top:0cm;
 mso-para-margin-right:0cm;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0cm;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-fareast-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Bueno después de toda esta introducción si no conocías a
MIPONY seguro que estás pensando voy corriendo a descargarlo de su sitio web. Que
sucede?&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Bueno que cuando vayas a descargar a mipony observaras que
la descarga es súper rápida, es de &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;200k el
tamaño del EXE que te bajas. Eso es como un lanzador que instala publicidad y
otra basura de propaganda mientas realiza la descarga del instalador real que
pesa poco menos de 6 megas.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
He capturado ese instalador para que realices la instalación
del mejor gestor de descarga en limpio y no sufras con el instalador principal.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
De hecho puedes intentar bajarte ese lanzador desde la web
oficial y checar tu antivirus, algunos te bloquean ese lanzador ya que instala
mucha propaganda.&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;a href=&quot;http://bit.ly/mipony212&quot; target=&quot;_blank&quot;&gt;Descargar: &lt;span class=&quot;invisible&quot;&gt;http://&lt;/span&gt;&lt;span class=&quot;js-display-url&quot;&gt;bit.ly/mipony212&lt;/span&gt;&lt;span class=&quot;tco-ellipsis&quot;&gt;&lt;span class=&quot;invisible&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;tco-ellipsis&quot;&gt;&lt;span class=&quot;invisible&quot;&gt;Gracias... &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://ethicalhackernet.blogspot.com/2014/03/mipony-v212-clean-installer-mipony-v212.html</link><author>noreply@blogger.com (Rafael Maita)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-6988884023116493800</guid><pubDate>Sat, 07 Apr 2012 21:08:00 +0000</pubDate><atom:updated>2012-04-07T16:40:42.707-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-malware threats</category><category domain="http://www.blogger.com/atom/ns#">Anti-virus tests</category><category domain="http://www.blogger.com/atom/ns#">crimeware</category><category domain="http://www.blogger.com/atom/ns#">fake anti.virus</category><category domain="http://www.blogger.com/atom/ns#">fake av</category><category domain="http://www.blogger.com/atom/ns#">rogue av</category><title>Cuando escuchas el término Crimeware en que piensas…?</title><description>&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:trackmoves/&gt;   &lt;w:trackformatting/&gt;   &lt;w:hyphenationzone&gt;21&lt;/w:HyphenationZone&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:donotpromoteqf/&gt;   &lt;w:lidthemeother&gt;ES&lt;/w:LidThemeOther&gt;   &lt;w:lidthemeasian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:lidthemecomplexscript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;    &lt;w:splitpgbreakandparamark/&gt;    &lt;w:enableopentypekerning/&gt;    &lt;w:dontflipmirrorindents/&gt;    &lt;w:overridetablestylehps/&gt;   &lt;/w:Compatibility&gt;   &lt;m:mathpr&gt;    &lt;m:mathfont val=&quot;Cambria Math&quot;&gt;    &lt;m:brkbin val=&quot;before&quot;&gt;    &lt;m:brkbinsub val=&quot;&amp;#45;-&quot;&gt;    &lt;m:smallfrac val=&quot;off&quot;&gt;    &lt;m:dispdef/&gt;    &lt;m:lmargin val=&quot;0&quot;&gt;    &lt;m:rmargin val=&quot;0&quot;&gt;    &lt;m:defjc val=&quot;centerGroup&quot;&gt;    &lt;m:wrapindent val=&quot;1440&quot;&gt;    &lt;m:intlim val=&quot;subSup&quot;&gt;    &lt;m:narylim val=&quot;undOvr&quot;&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate=&quot;false&quot; defunhidewhenused=&quot;true&quot; defsemihidden=&quot;true&quot; defqformat=&quot;false&quot; defpriority=&quot;99&quot; latentstylecount=&quot;267&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;0&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Normal&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;heading 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 7&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 8&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 9&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 7&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 8&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 9&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;35&quot; qformat=&quot;true&quot; name=&quot;caption&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;10&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Title&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;1&quot; name=&quot;Default Paragraph Font&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;11&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtitle&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;22&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Strong&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;20&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;59&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Table Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Placeholder Text&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;1&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;No Spacing&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Revision&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;34&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;List Paragraph&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;29&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Quote&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;30&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Quote&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;19&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtle Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;21&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;31&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtle Reference&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;32&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Reference&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;33&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Book Title&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;37&quot; name=&quot;Bibliography&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; qformat=&quot;true&quot; name=&quot;TOC Heading&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable  {mso-style-name:&quot;Tabla normal&quot;;  mso-tstyle-rowband-size:0;  mso-tstyle-colband-size:0;  mso-style-noshow:yes;  mso-style-priority:99;  mso-style-parent:&quot;&quot;;  mso-padding-alt:0cm 5.4pt 0cm 5.4pt;  mso-para-margin-top:0cm;  mso-para-margin-right:0cm;  mso-para-margin-bottom:10.0pt;  mso-para-margin-left:0cm;  line-height:115%;  mso-pagination:widow-orphan;  font-size:11.0pt;  font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;  mso-ascii-font-family:Calibri;  mso-ascii-theme-font:minor-latin;  mso-hansi-font-family:Calibri;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-bidi-theme-font:minor-bidi;  mso-ansi-language:ES;  mso-fareast-language:EN-US;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;El Crimeware es&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;ES&quot;&gt; &lt;span class=&quot;hps&quot;&gt;un tipo de malware&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;diseñado específicamente&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;para automatizar&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;la ciberdelincuencia&lt;/span&gt;, esta es una definición creada por Peter Cassidy, Secretario General del Anti-Phishing Working Group.&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;La &lt;em&gt;delincuencia organizada&lt;/em&gt;&lt;em&gt;&lt;span style=&quot;font-style: normal;&quot;&gt; contrata a hackers y los va llevando hacia sus redes, prometiéndoles recompensas y beneficios que serían muy difíciles de alcanzar en una vida profesional “honesta”; al entrar en mundo de la delincuencia organizada los hackers se convierten en: “Black Hats”, y la Delincuencia organizada&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;&lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;se convierte en “Ciberdelincuencia Organizada”.&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-style: normal;&quot; lang=&quot;ES&quot;&gt;Si deseamos buscar los orígenes de la Ciberdelincuencia Organizada podemos remontarnos a mediados del 2001 donde un grupo de Black Hats ucranianos creó el sitio CarderPlanet.com&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;Hackers reconocidos han terminado trabajando para la Ciberdelincuencia Organizada, en el negocio del Crimeware, sucumbiendo a los muy grandes incentivos ante un trabajo que naturalmente les gusta hacer.&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;Hackers como&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;Max Vision de EEUU, Cagatay Evyapan de Turquía y otros, relatan historias similares cuando les preguntas como entraron en el mundo de la Ciberdelincuencia Organizada. &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;Quien pensaría que por crear un Crimeware, te pagaran entre 3000$US y 5000$US?; mucho más aun si hablamos de vender tarjetas de crédito robadas…&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;Cuanto tenemos que trabajar nosotros para ganar la misma cantidad de dinero?&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;De los muchos tipos de Crimeware que hay en el mercado, vamos a dedicar esta edición a hablar de uno en particular que les aseguro deben haber visto en alguna PC. Este es el escenario: Estás navegado por internet y de repente en una web recibes &lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;un mensaje que dice: “tu computadora está infectada”,&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;si deseas solucionar el problema instala este programa o antivirus “gratuito”. Al momento de instalarlo, tu computador empieza a mostrarte mensajes de que se está realizando un escaneo, cuando lo que está ocurriendo es que ya tu equipo está infectado, y la infección simplemente se está propagando; algunos iconos de tu computador cambian y empiezas a recibir mensajes que &lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;dicen que para remover el malware (o virus, como desees llamarle) debes de adquirir la licencia del programa, alertándote a cada rato de la infección, casi de forma molesta. Si han notado un comportamiento similar en su computador o en el de algún conocido, ya conocen&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;este Crimeware; esto es lo que los expertos llaman: &lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size:12.0pt;line-height:115%; color:red&quot; lang=&quot;ES&quot;&gt;Rogue Antivirus&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;ES&quot;&gt;.&lt;br /&gt;Este tipo de Crimeware se fundamenta en el temor generalizado de las personas a las infecciones de virus,&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;y recurre a constantes alertas que dicen que tu computador está infectado y que necesitas adquirir una licencia para&lt;span style=&quot;mso-spacerun:yes&quot;&gt;   &lt;/span&gt;limpiar la infección. &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;Lo que persigue la &lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;Ciberdelincuencia Organizada con esto, es conseguir tu información financiera.&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;Esto lo logra “forzándote” a adquirir una &lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;licencia; al intentar hacerlo, estarás entregándoles directamente la información de &lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;tu tarjeta de crédito.&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;Con esta información a la mano, la ciberdelincuencia puede realizar otra cantidad de acciones ilegales. &lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;Las páginas &lt;span style=&quot;mso-spacerun:yes&quot;&gt; &lt;/span&gt;web diseñadas para este tipo de “scam” pueden parecer muy reales, la de una compañía de antivirus seria que contiene todos los iconos y certificados que te daría seguridad a ti para proceder con la compra.&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;También, dependiendo del diseño del Crimeware, puede que ocurra el caso en el que este incluya algunas subrutinas adicionales que graben toda la información que introduces en tu PC, y en las páginas web que visitas; entregándole así al dueño del Crimeware toda la información que necesita para realizar el fin que persigue.&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;Ya con tus datos en su poder, los ciberdelincuentes pueden hacer lo que deseen: robo de identidad, compras con tu dinero, o pueden incluso vender tus datos a terceros. &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;Puedes infectarte con un Rogue Antivirus desde muchos destinos en internet; no necesariamente tienes que estar navegando en sitios de dudosa procedencia, como&lt;span style=&quot;mso-spacerun:yes&quot;&gt;  &lt;/span&gt;piensa la mayoría de las personas (páginas de adultos, buscando programas licenciados en sitios de descargas gratuitos, etc.).&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;La compañía Websense ha detectado un ataque donde fueron unos 200.000 sitios web legítimos, “infectados”. La ciberdelincuencia se ha aprovechado de vulnerabilidades (grietas de seguridad) en estos sitios, y ha podido “sembrar” un código malicioso en esas páginas web para que cuando una persona las visite se descargue e instale el Rogue Antivirus.&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;Así que si notas este tipo de programa y comportamiento en tu computador, ya sabes que estás ante un tipo de Crimeware; toma las medidas necesarias pronto!.&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify; font-family: arial;&quot;&gt;&lt;span lang=&quot;ES&quot;&gt;En la siguiente entrega hablaremos de una herramienta que utiliza mucho la Ciberdelincuencia: Las Botnets…&lt;/span&gt;&lt;/p&gt;</description><link>http://ethicalhackernet.blogspot.com/2012/04/cuando-escuchas-el-termino-crimeware-en.html</link><author>noreply@blogger.com (Rafael Maita)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-8424432882653873129</guid><pubDate>Fri, 29 Jul 2011 00:29:00 +0000</pubDate><atom:updated>2011-07-28T19:59:54.594-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">alternate identity</category><category domain="http://www.blogger.com/atom/ns#">anonymous</category><category domain="http://www.blogger.com/atom/ns#">cloak</category><category domain="http://www.blogger.com/atom/ns#">conceal identity</category><category domain="http://www.blogger.com/atom/ns#">dagger</category><category domain="http://www.blogger.com/atom/ns#">disposable email</category><category domain="http://www.blogger.com/atom/ns#">encryption</category><category domain="http://www.blogger.com/atom/ns#">free wifi</category><category domain="http://www.blogger.com/atom/ns#">GPS tracking</category><category domain="http://www.blogger.com/atom/ns#">hermit</category><category domain="http://www.blogger.com/atom/ns#">pay phones</category><category domain="http://www.blogger.com/atom/ns#">RFID</category><category domain="http://www.blogger.com/atom/ns#">social engineering</category><category domain="http://www.blogger.com/atom/ns#">social media privacy</category><category domain="http://www.blogger.com/atom/ns#">surveillance</category><title>True Identity vs Anonymous: Evaluating real-life examples</title><description>The privacy and dignity of our citizens are being whittled away by sometimes imperceptible steps. Taken individually, each step may be of little consequence. But when viewed as a whole, there begins to emerge a society quite unlike any we have seen, &quot;&lt;i&gt;a society in which government may intrude into the secret regions of a person&#39;s life&lt;/i&gt;&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Why be Anonymous?&lt;/b&gt;&lt;br /&gt;
&quot;&lt;i&gt;The right to be let alone is indeed the beginning of all freedom&lt;/i&gt;&quot;.&lt;br /&gt;
1.Everyone has the right to privacy.&lt;br /&gt;
2.Anonymous NOT EQUALS Law-breaker.&lt;br /&gt;
3.Requires intellect, desire, diligence, and dedication.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Cloak&lt;/b&gt;&lt;br /&gt;
-Minimally anonymous&lt;br /&gt;
-The FBI will find you&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Dagger&lt;/b&gt;&lt;br /&gt;
-Moderately anonymous&lt;br /&gt;
-More difficult&lt;br /&gt;
-Potentially illegal&lt;br /&gt;
-The FBI can find you&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hermit&lt;/b&gt;&lt;br /&gt;
-Off the grid&lt;br /&gt;
-Completely invisible&lt;br /&gt;
-Up to you who finds you&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Awareness&lt;/b&gt;&lt;br /&gt;
-Must develop new habits, gets easier over time&lt;br /&gt;
-Be discreet when talking to others&lt;br /&gt;
-Say as little as possible&lt;br /&gt;
-Identity awareness&lt;br /&gt;
-Use social engineering&lt;br /&gt;
-Look Around!&lt;br /&gt;
-Situational awareness&lt;br /&gt;
-Look for and avoid surveillance&lt;br /&gt;
-Blend in, do not stand out&lt;br /&gt;
-Ongoing process&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Getting Started In Real Life&lt;/b&gt;&lt;br /&gt;
-Cancel All Subscriptions&lt;br /&gt;
-Forward Mail to a Secondary Address (Third-Party, Scanned Mail Service)&lt;br /&gt;
-Expunge legal and credit histories&lt;br /&gt;
-Place locks on credit files&lt;br /&gt;
-Shred everything&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Getting Started Online&lt;/b&gt;&lt;br /&gt;
-Eliminate online profiles (Friendster, MySpace, Facebook, etc)&lt;br /&gt;
-Clean Up Search History&lt;br /&gt;
-Nothing in the Cloud (Host Your Own, Encrypt Everything)&lt;br /&gt;
-Everything in the Cloud (Host Nothing, Encrypt Everything)&lt;br /&gt;
-Format and Reinstall&lt;br /&gt;
-Create All New Accounts&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Becoming Anonymous&lt;/b&gt;&lt;br /&gt;
-Change your name&lt;br /&gt;
-Alternative ID&lt;br /&gt;
-Alter fingerprints&lt;br /&gt;
-Sell registered properties&lt;br /&gt;
-Terminate all contracts&lt;br /&gt;
-Disposable email addresses (Dodgit, Guerilla Mail, Gmail, Hotmail, Yahoo)&lt;br /&gt;
-Mail box rentals (Mailboxes, Scanned Mail Service)&lt;br /&gt;
-Fake your own death&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgno4DpPDK3XBcBcG7PwRh5PbcFAlazLw4n39EaIOwj_iKkMclp1C9zEOQdBm6fpkV2qqyEtrucOrlmpw_PGMG5QAF6KRS7lv3zX7ADJSTgjke-YLFWAICa9XBMw-RU4f-mcwVgoCVvi7A/s1600/10-Jul-29-11-pic1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;204&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgno4DpPDK3XBcBcG7PwRh5PbcFAlazLw4n39EaIOwj_iKkMclp1C9zEOQdBm6fpkV2qqyEtrucOrlmpw_PGMG5QAF6KRS7lv3zX7ADJSTgjke-YLFWAICa9XBMw-RU4f-mcwVgoCVvi7A/s320/10-Jul-29-11-pic1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Shelter&lt;/b&gt;&lt;br /&gt;
-Single Room Occupancy (Cash rent, Long-term sublet, Shared utilities)&lt;br /&gt;
-Unregistered RV&lt;br /&gt;
-Commune (Kibbutz, Nudist Colony, Don’t Drink the Kool-Aid)&lt;br /&gt;
-Travel Continuously (Couch Surfing, Hostels, Shelters, Public Parks, Squatting)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Making Money&lt;/b&gt;&lt;br /&gt;
-Jobs that pay cash&lt;br /&gt;
-The world&#39;s oldest profession (e.g. Porn)&lt;br /&gt;
-Day labor&lt;br /&gt;
-Service industry&lt;br /&gt;
-Graphics and web design&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Using Money&lt;/b&gt;&lt;br /&gt;
-Use Cash&lt;br /&gt;
-Classifieds, Cash Auctions&lt;br /&gt;
-Gift Cards, use as CCs&lt;br /&gt;
-Check Cashing Services&lt;br /&gt;
-Digital Money (E-Gold, Paypal Corporate, Internet Bartering)&lt;br /&gt;
-Money Orders&lt;br /&gt;
-Offshore Accounts&lt;br /&gt;
-Sugar Daddy&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Transportation&lt;/b&gt;&lt;br /&gt;
-Public (Buses, Trains)&lt;br /&gt;
-Metro&lt;br /&gt;
-Cabs &amp;amp; Gypsy Cabs&lt;br /&gt;
-Greyhound&lt;br /&gt;
-Carpool / Rideshare&lt;br /&gt;
-Vehicles w/o Registration (Bicycles, 50cc Scooters)&lt;br /&gt;
-Travel in Disguise (Wear hats and glasses, Pre-determine camera locations)&lt;br /&gt;
-Avoid frequent mass-transit&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Tracking&lt;/b&gt;&lt;br /&gt;
-Disable GPS devices&lt;br /&gt;
-Disable bluetooth&lt;br /&gt;
-Turn cell phone off when not in use&lt;br /&gt;
-RFID tags (RFID Zapper, Use a shielded wallet)&lt;br /&gt;
-Harden computers and smart phones&lt;br /&gt;
-Tinfoil hat&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Communications&lt;/b&gt;&lt;br /&gt;
-Telecom (Pay phones, burners, Prepaid LD)&lt;br /&gt;
-Internet (Use email lightly, Internet Relay Chat, Usenet / classifieds)&lt;br /&gt;
-Encryption (Off the Record, Steganography)&lt;br /&gt;
-Phreaking&lt;br /&gt;
-Voice over IP (Hosted VoIP, BYO VoIP)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Online&lt;/b&gt;&lt;br /&gt;
-Public kiosks, local wifi&lt;br /&gt;
-Prepaid SIMs for data&lt;br /&gt;
-Use a Live CD&lt;br /&gt;
-Use tor, anonymous proxies&lt;br /&gt;
-Enable safe browsing&lt;br /&gt;
-Anonymous searching (startpage, googlesharing, customize google)&lt;br /&gt;
-Anonymous remailers&lt;br /&gt;
-Netbook + Truecrypt encrypted SSD, USB&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Social Interaction&lt;/b&gt;&lt;br /&gt;
-Use disguises in public&lt;br /&gt;
-No long term communities&lt;br /&gt;
-Use a proxy&lt;br /&gt;
-Avoid people&lt;br /&gt;
-Avoid all social networking&lt;br /&gt;
-Avoid all publicity&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Rules&lt;/b&gt;&lt;br /&gt;
-Do not be your identity&lt;br /&gt;
-Get rid of your paper trail&lt;br /&gt;
-Use cash&lt;br /&gt;
-Constantly improve your situational awareness&lt;br /&gt;
-Blend in&lt;br /&gt;
-Encrypt everything</description><link>http://ethicalhackernet.blogspot.com/2011/07/true-identity-vs-anonymous-evaluating.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgno4DpPDK3XBcBcG7PwRh5PbcFAlazLw4n39EaIOwj_iKkMclp1C9zEOQdBm6fpkV2qqyEtrucOrlmpw_PGMG5QAF6KRS7lv3zX7ADJSTgjke-YLFWAICa9XBMw-RU4f-mcwVgoCVvi7A/s72-c/10-Jul-29-11-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-7107492492142141728</guid><pubDate>Thu, 07 Jul 2011 00:09:00 +0000</pubDate><atom:updated>2011-07-06T19:39:52.174-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">CORE-2008-01035</category><category domain="http://www.blogger.com/atom/ns#">CORE-2008-0826</category><category domain="http://www.blogger.com/atom/ns#">CORE-2009-06256</category><category domain="http://www.blogger.com/atom/ns#">IE attack</category><category domain="http://www.blogger.com/atom/ns#">IE exploitation</category><category domain="http://www.blogger.com/atom/ns#">IE zone elevation</category><category domain="http://www.blogger.com/atom/ns#">internet explorer exploit</category><category domain="http://www.blogger.com/atom/ns#">internet explorer vulnerabilities</category><category domain="http://www.blogger.com/atom/ns#">MIME type detection</category><title>Internet Explorer: Your personal computer is public property</title><description>A successful compromise will result in an attacker being able to blindly read every single file in the local drive.&lt;br /&gt;
–Either text and binary files (thanks MSXML2.DOMDocument.3.0!)&lt;br /&gt;
–Cross-domain information (Navigation history, Cookies)&lt;br /&gt;
–SAM backup files&lt;br /&gt;
–Recently opened files&lt;br /&gt;
–Personal pictures&lt;br /&gt;
–Other files, depending on the computer compromised (wwwroot in IIS, Configuration files for other applications)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Internet Explorer Internals&lt;/b&gt;&lt;br /&gt;
-Every browser has its own idiosyncrasies&lt;br /&gt;
-For the purposes of this presentation, it is convenient to review some design features of Internet Explorer&lt;br /&gt;
1.Security Zones&lt;br /&gt;
2.Zone Elevation&lt;br /&gt;
3.MIME type detection&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Security Zones&lt;/b&gt;&lt;br /&gt;
-Enable administrators to divide URL namespaces according to their respective levels of trust and to manage each level with an appropriate URL policy Different treatment for web content depending on its source&lt;br /&gt;
-Five different sets of privileges (zones)&lt;br /&gt;
&lt;i&gt;1.Restricted Sites&lt;br /&gt;
2.Internet&lt;br /&gt;
3.Trusted Sites&lt;br /&gt;
4.Local Intranet&lt;br /&gt;
5.Local Machine&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Zone Elevation&lt;/b&gt;&lt;br /&gt;
-It occurs when a Web page in a given security zone loads a page from a less restrictive zone in a frame or a new window&lt;br /&gt;
-Internet Explorer behaves different based on which is the less restrictive zone up to which is trying to elevate&lt;br /&gt;
&lt;i&gt;1.to the Local Machine zone is blocked&lt;br /&gt;
2.to the Intranet or Trusted Sites zones prompts for a confirmation&lt;br /&gt;
3.from the Restricted Sites zone to the Internet zone is allowed&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;MIME type detection&lt;/b&gt;&lt;br /&gt;
-Tests URL monikers through the FindMimeFromData method&lt;br /&gt;
-Determining the MIME type proceeds as follows:&lt;br /&gt;
&lt;i&gt;1.If the suggested MIME type is unknown, FindMimeFromData immediately returns this MIME type as the final determination&lt;br /&gt;
2.If the server-provided MIME type is either known or ambiguous, the buffer is scanned in an attempt to verify or obtain a MIME type&lt;br /&gt;
3.If no positive match is obtained, and if the server-provided MIME type is known&lt;br /&gt;
4.If no conflict exists, the server-provided MIME type is returned. If conflict exist, the file extension is tried.&lt;br /&gt;
5.Otherwise defaults to text/plain or application/octet-stream&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Features (vulnerabilities) enumeration&lt;/b&gt;&lt;br /&gt;
-Hiding the key under the doormat&lt;br /&gt;
-A chip off the old block&lt;br /&gt;
-Two zones, the same place&lt;br /&gt;
-How to put HTML/script code in remote computers&lt;br /&gt;
-Everything that glitters is not gold&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hiding the key under the doormat&lt;/b&gt;&lt;br /&gt;
-Internet Explorer cookies and history files are stored in different files and folders under %USERPROFILE%&lt;br /&gt;
-As a security measure, these files are stored inside randomly named folders with random file names&lt;br /&gt;
-These random names and locations are logged inside different mapping files named index.dat&lt;br /&gt;
&lt;blockquote&gt;%USERPROFILE%\Local settings\History\History.IE5\index.dat&lt;br /&gt;
%USERPROFILE%\Local settings\IECompatCache\index.dat&lt;br /&gt;
%USERPROFILE%\Cookies\index.dat&lt;/blockquote&gt;-These files are not entirely text formatted&lt;br /&gt;
-As these files work as maps to other files, access to these files would reveal the actual locations of mapped files and folders&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;goog_71663259&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_71663260&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6yO06P1v0lz1eXgAhx7CeEFyXW6ZOu5dkuW8DgdumujpodtrtUyaUpJd5G6fcPZxDFmVLnjApP-6AEJiiwwNDniadfRl7x8R3nrtjM2UWQbkqDyrDCwijTczgRmYRghRmpo394PCWnxQ/s1600/09-Jul-07-11-pic1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;100&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6yO06P1v0lz1eXgAhx7CeEFyXW6ZOu5dkuW8DgdumujpodtrtUyaUpJd5G6fcPZxDFmVLnjApP-6AEJiiwwNDniadfRl7x8R3nrtjM2UWQbkqDyrDCwijTczgRmYRghRmpo394PCWnxQ/s400/09-Jul-07-11-pic1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;A chip off the old block&lt;/b&gt;&lt;br /&gt;
-Internet Explorer resembles Windows Explorer in many aspects (both of them implement the Trident layout engine and both of them support UNC paths for SMB access)&lt;br /&gt;
-This way, Internet Explorer allows to access special files and folders, same as Windows Explorer does&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcqwcg_IjZ2me7fdUUIgVAOQd8aRA-WxZknMRZoopp1TQRLPnnskBP95lHhfdb2bB0qcXLF3AueWmYYon3Jz-QuCusuKFt3vRXlvGHlNhM_pKLVwS1A_AmOmsX6irv6zMfpJHouXsaxxA/s1600/09-Jul-07-11-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcqwcg_IjZ2me7fdUUIgVAOQd8aRA-WxZknMRZoopp1TQRLPnnskBP95lHhfdb2bB0qcXLF3AueWmYYon3Jz-QuCusuKFt3vRXlvGHlNhM_pKLVwS1A_AmOmsX6irv6zMfpJHouXsaxxA/s400/09-Jul-07-11-pic2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgihABXf3jWr3H33jYwrgQgKKkNjzJ28kngy-imcH3ZbS-mjnETUvjEfbTMWROtgfDdgHBkwEO4uACb61BToWaecacwJz-t4cIjod53YTonu1uqQUAa6ICpQSJFNR1C7ignA0bWURwB6jw/s1600/09-Jul-07-11-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgihABXf3jWr3H33jYwrgQgKKkNjzJ28kngy-imcH3ZbS-mjnETUvjEfbTMWROtgfDdgHBkwEO4uACb61BToWaecacwJz-t4cIjod53YTonu1uqQUAa6ICpQSJFNR1C7ignA0bWURwB6jw/s400/09-Jul-07-11-pic3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQtLgWw6C5xZyopDlHQfrVbgWmpBxw0QjI3JnbMrFcoiV6tieAEmxORY70Xm75eAgtgaxQHj6xzJ2ATYiUr38T2rWXTdcUP8jCT8nPOzVwX0Xcl3xgtI_NlBsRbmtyEKMa9DVLVgoy_GE/s1600/09-Jul-07-11-pic4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;298&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQtLgWw6C5xZyopDlHQfrVbgWmpBxw0QjI3JnbMrFcoiV6tieAEmxORY70Xm75eAgtgaxQHj6xzJ2ATYiUr38T2rWXTdcUP8jCT8nPOzVwX0Xcl3xgtI_NlBsRbmtyEKMa9DVLVgoy_GE/s400/09-Jul-07-11-pic4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Any web page in the Internet zone or above can include an HTML tag as follows:&lt;br /&gt;
&lt;blockquote&gt;&lt;img src=&quot;\\208.77.188.166\image.jpg&quot; /&gt;&lt;/blockquote&gt;-It will trigger an SMB request against 208.77.188.166&lt;br /&gt;
-As part of the challenge-response negotiation, the client sends to the server the following information about itself:&lt;br /&gt;
&lt;i&gt;1.Windows user name&lt;br /&gt;
2.Windows domain name&lt;br /&gt;
3.Windows computer name&lt;br /&gt;
4.A challenge value chosen by the web server ciphered with the LM/NTLM hash of this user’s password&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Two zones, the same place&lt;/b&gt;&lt;br /&gt;
-Internet Explorer will determine the security zone of a given UNC address as belonging to:&lt;br /&gt;
&lt;i&gt;1.The Internet security zone if this path contains the IP address of the target machine&lt;br /&gt;
2.The Local Intranet security zone if this path contains the NetBIOS name of the target machine&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
-It makes sense, as SMB names just can be resolved in the same network segment&lt;br /&gt;
-\\NEGRITA is in the Local Intranet zone&lt;br /&gt;
-\\127.0.0.1 is in the Internet zone&lt;br /&gt;
-This is one of the root causes of the problems the Microsoft staff has into closing the attack vectors exposed here&lt;br /&gt;
-After several discussions with MSRC team members, they stated this issue is kind of a dead end, and cannot be fixed&lt;br /&gt;
-According to the Security Zones scheme, a page in a given zone can not redirect its navigation to a more privileged zone&lt;br /&gt;
-This behavior is known as Zone Elevation&lt;br /&gt;
-Now, consider the following dialog:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7akiQn4EDTXBZRB6SGDCsQ8toYvpX5sA785BQq3QlxMcxaIm-Gl5ZGFNIPvpNTEHuCzOzKQoL_5H7-4ekyQ9MGtVMr7eP3xjtY1YGa3Rz3tRRxLkSIXwvd606aufivwV1iyrMbYQrbUE/s1600/09-Jul-07-11-pic5.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;90&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7akiQn4EDTXBZRB6SGDCsQ8toYvpX5sA785BQq3QlxMcxaIm-Gl5ZGFNIPvpNTEHuCzOzKQoL_5H7-4ekyQ9MGtVMr7eP3xjtY1YGa3Rz3tRRxLkSIXwvd606aufivwV1iyrMbYQrbUE/s400/09-Jul-07-11-pic5.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
-In this case Internet Explorer will erroneously (due to this ambiguity) apply Zone Elevation restrictions and the redirection will effectively occur&lt;br /&gt;
-There is another way to bypass Security Zone restrictions&lt;br /&gt;
-Suppose that example.com (10.1.1.1) was explicitly added to the Restricted Sites Security Zone&lt;br /&gt;
-Then this URI will be treated with the privileges of that zone&lt;br /&gt;
-However, if the same resource is requested using the UNC notation, it will be treated as belonging to the Internet Security Zone (e.g. \\10.1.1.1\index.html)&lt;br /&gt;
-Restricted Sites restrictions to a given resource are bypassed if it can be accessed using a different protocol [file: | https: | ...]&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0FJQY884pBOem6y2F8XPiMDIJ96AMl80qmpTRrZkwkrvF7MZIRvl4rT7LOxkRvEvLxEvdHU5yeB-A3AKvk9LYMAXFzP2fEe34LU-og6YNTJn-webY5TVRhQ4GekMsi8WK2LZDJh5NTSY/s1600/09-Jul-07-11-pic6.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0FJQY884pBOem6y2F8XPiMDIJ96AMl80qmpTRrZkwkrvF7MZIRvl4rT7LOxkRvEvLxEvdHU5yeB-A3AKvk9LYMAXFzP2fEe34LU-og6YNTJn-webY5TVRhQ4GekMsi8WK2LZDJh5NTSY/s400/09-Jul-07-11-pic6.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;How to put HTML/script code in remote computers&lt;/b&gt;&lt;br /&gt;
-There are different ways for remote servers to write HTML/script code in clients hard drives&lt;br /&gt;
&lt;i&gt;1.Navigation history files&lt;br /&gt;
2.Cookies&lt;br /&gt;
3.Mapping files (Internet Explorer index.dat)&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
-Problems in the design/implementation of these feature&lt;br /&gt;
&lt;i&gt;1.Contents are saved as they were received, with little or no sanitization/overhead, into these files&lt;br /&gt;
2.Internet Explorer allows rendering the contents of non-pure HTML files skipping the parts that can not be rendered&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrDxaNH-MtuoVTZWWFtQG3YBGXF6WNwHIRE-1ROtYHaFphzxyMd8F56lYLREf1KZkIznO1XctSDD9d4Ho-xiskKCscNliJrq4RUIVdVCbzrHFBPSUnhJdKyKblpgeyUR-44hjbzk_2mP4/s1600/09-Jul-07-11-pic7.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;257&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrDxaNH-MtuoVTZWWFtQG3YBGXF6WNwHIRE-1ROtYHaFphzxyMd8F56lYLREf1KZkIznO1XctSDD9d4Ho-xiskKCscNliJrq4RUIVdVCbzrHFBPSUnhJdKyKblpgeyUR-44hjbzk_2mP4/s400/09-Jul-07-11-pic7.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Everything that glitters is not gold&lt;/b&gt;&lt;br /&gt;
-The way Internet Explorer decides how to treat a given file is known as MIME type detection&lt;br /&gt;
-It basically uses an algorithm to find and launch the correct object server/application to handle the requested content&lt;br /&gt;
-Is based on information obtained from&lt;br /&gt;
&lt;i&gt;1.The server-supplied MIME type, if available&lt;br /&gt;
2.An examination of the actual contents associated with a downloaded URL (FindMimeFromData)&lt;br /&gt;
3.The file name associated with the downloaded content (assumed to be derived from the associated URL)&lt;br /&gt;
4.Registry settings (file extension/MIME type associations or registered applications) in effect during the download&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
-Problems in the design/implementation of this feature:&lt;br /&gt;
1.The server-provided MIME type is returned when the following conditions are true:&lt;br /&gt;
&lt;i&gt;-no positive match is obtained from the FindMimeFromData() buffer scan&lt;br /&gt;
-server-provided MIME type is known&lt;br /&gt;
-no conflict exists (format is either text or binary)&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
2.Has been probed (more than once) not to behave deterministically when accessing the same resource through different methods&lt;br /&gt;
&lt;i&gt;-direct navigation&lt;br /&gt;
-redirection&lt;br /&gt;
-frame/iframe reference&lt;br /&gt;
-scripting&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Turning features into vulnerabilities to build an attack&lt;/b&gt;&lt;br /&gt;
-In and of itself each of these bugs may not seem like something you should be concerned about&lt;br /&gt;
-The combined use of them by an attacker may lead to some interesting attacks&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Case 1: Attacking local networks with shared folders&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvKnBk51N3kKOsgiggtMY6MQ-gHhtMGK8V6TO1c0YMZgpoAszs0UWh0Bd6w4LNv0B3BGtpb_zFr1y4fx0LDnfQ9C1qmmg4gK_UFJvkUeEhMxZzupfEissNX8WfwwuH_-K8eMSVmz18ViY/s1600/09-Jul-07-11-pic8.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;50&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvKnBk51N3kKOsgiggtMY6MQ-gHhtMGK8V6TO1c0YMZgpoAszs0UWh0Bd6w4LNv0B3BGtpb_zFr1y4fx0LDnfQ9C1qmmg4gK_UFJvkUeEhMxZzupfEissNX8WfwwuH_-K8eMSVmz18ViY/s400/09-Jul-07-11-pic8.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Case 2: Attacking the Internet user&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDu5KDFQxHDwxGBsrpAKIiIUaZjjkE_yAvHNXaaXgKH5t1xw3vvPpGm53POk4GX6qITwIiDg1TGzo3g3eJuuKsRppwloBBVPpRGJQUgTbGrYMgNHgXZ5QfUen6UZLcxfuG775EK9x9GmI/s1600/09-Jul-07-11-pic9.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;68&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDu5KDFQxHDwxGBsrpAKIiIUaZjjkE_yAvHNXaaXgKH5t1xw3vvPpGm53POk4GX6qITwIiDg1TGzo3g3eJuuKsRppwloBBVPpRGJQUgTbGrYMgNHgXZ5QfUen6UZLcxfuG775EK9x9GmI/s400/09-Jul-07-11-pic9.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Overall Impact&lt;/b&gt;&lt;br /&gt;
-By chaining the exploitation of a series of weak features an attacker is able to store HTML and scripting code in the victim’s computer and force the victim’s browser to load and render it&lt;br /&gt;
-127.0.0.1 is in the Internet Zone, but as the code is actually stored in the victim’s computer, it can access other files in the same computer (in this case, the victim’s computer)&lt;br /&gt;
&lt;i&gt;1.SAM backup files&lt;br /&gt;
2.All of the victim’s HTTP cookies and history files&lt;br /&gt;
3.Source files in Inetpub\wwwroot&lt;br /&gt;
4.Recent files, personal pictures (thumbs.db maps these files)&lt;br /&gt;
5.Any other file on the local system (system events, configurations)&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
These attack scenarios have been proven to work:&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;1.CORE-2008-01035&lt;/span&gt;&lt;br style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot; /&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;2.CORE-2008-0826&lt;/span&gt;&lt;br style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot; /&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;3.CORE-2009-06256&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
-The only difference is in the way Internet Explorer is tricked into rendering its internal tracking files as HTML&lt;br /&gt;
-That is the only thing Microsoft is fixing. This is a design problem. They are just blocking our proof of concept&lt;br /&gt;
-That is why we are breaking it over and over again&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Solutions and Workarounds&lt;/b&gt;&lt;br /&gt;
-Internet Explorer Network Protocol Lockdown&lt;br /&gt;
-Set the Security Level setting for the Internet and Intranet zones to High&lt;br /&gt;
-Disable Active Scripting for the Internet and Intranet zone with a custom setting&lt;br /&gt;
-Only run Internet Explorer in Protected Mode&lt;br /&gt;
-Use a different web browser to navigate untrusted web sites</description><link>http://ethicalhackernet.blogspot.com/2011/07/internet-explorer-your-personal.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6yO06P1v0lz1eXgAhx7CeEFyXW6ZOu5dkuW8DgdumujpodtrtUyaUpJd5G6fcPZxDFmVLnjApP-6AEJiiwwNDniadfRl7x8R3nrtjM2UWQbkqDyrDCwijTczgRmYRghRmpo394PCWnxQ/s72-c/09-Jul-07-11-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-4376948905930598353</guid><pubDate>Thu, 30 Jun 2011 23:25:00 +0000</pubDate><atom:updated>2012-05-16T11:52:36.499-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">attack vmware</category><category domain="http://www.blogger.com/atom/ns#">hacking vmware</category><category domain="http://www.blogger.com/atom/ns#">stealing vmware guest</category><category domain="http://www.blogger.com/atom/ns#">virtualization hack</category><category domain="http://www.blogger.com/atom/ns#">virtualization security</category><category domain="http://www.blogger.com/atom/ns#">vmware exploit</category><category domain="http://www.blogger.com/atom/ns#">vmware mitigation</category><category domain="http://www.blogger.com/atom/ns#">vmware root</category><category domain="http://www.blogger.com/atom/ns#">vmware security</category><category domain="http://www.blogger.com/atom/ns#">vmware vulnerability</category><title>Attacking VMWare Guest Machines</title><description>&lt;b&gt;Vulnerability Discovery&lt;/b&gt;&lt;br /&gt;
-Vulnerability identified on 5/14/09&lt;br /&gt;
-Reported to VMware on 5/15/09&lt;br /&gt;
-VMware responded on 5/21/09&lt;br /&gt;
-CVE-2009-3733 reserved on 10/20/09&lt;br /&gt;
-VMSA-2009-0015 released on 10/27/09&lt;br /&gt;
-&quot;Directory Traversal vulnerability&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Identification&lt;/b&gt;&lt;br /&gt;
-Originally identified on VMware Server 2.0.1 build 156745 (on Ubuntu 8.04)&lt;br /&gt;
-Thought to be localized to inside of NAT interface of Host (8307/tcp)&lt;br /&gt;
-Can steal VMs from within other VMs... if NAT.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Description&lt;/b&gt;&lt;br /&gt;
-Web Access web servers also vulnerable&lt;br /&gt;
-Server (default ports 8222/8333) - ../ x 6&lt;br /&gt;
-ESX/ESXi (default ports 80/443) - %2E%2E/ x 6&lt;br /&gt;
-No longer requires NAT mode / Remotely exploitable&lt;br /&gt;
-Not as straightforward as originally thought&lt;br /&gt;
-Still trivial to exploit because...&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Root Access Is Easy&lt;/b&gt;&lt;br /&gt;
&lt;span id=&quot;goog_2146085000&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_2146085001&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJaHZGHbOMqWzC6dI0xwug4p6dcmNmDyjr3Tv2aZonpjypKCNAmbXN6knx8vVP1w7G5c7zbZYW3qs69-T3O-GUE5-lFqqZWAmJjegIrPGYYlb3LrJ7kVNVygtfaURspq8OhdcmtuHn5ps/s1600/08-Jun-30-11-pic1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;190&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJaHZGHbOMqWzC6dI0xwug4p6dcmNmDyjr3Tv2aZonpjypKCNAmbXN6knx8vVP1w7G5c7zbZYW3qs69-T3O-GUE5-lFqqZWAmJjegIrPGYYlb3LrJ7kVNVygtfaURspq8OhdcmtuHn5ps/s400/08-Jun-30-11-pic1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How it works?&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBgw6oXqwD8QCBR3EdEVriene8kko6r-enAhguL_CjVFSE4eYBabP_jZc_5UGuRo7sYch77nzRBc75_VxDQf9Ufrall4kIJUsfNlufpr019WiFIgz_v0NHOvV6dNm4nY2MDXJRdqPZKhs/s1600/08-Jun-30-11-pic2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBgw6oXqwD8QCBR3EdEVriene8kko6r-enAhguL_CjVFSE4eYBabP_jZc_5UGuRo7sYch77nzRBc75_VxDQf9Ufrall4kIJUsfNlufpr019WiFIgz_v0NHOvV6dNm4nY2MDXJRdqPZKhs/s400/08-Jun-30-11-pic2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
-Web server on 8308/tcp is vulnerable, but will only serve certain filetypes (xml, html, images, etc.)&lt;br /&gt;
-Web server on 8307/tcp is also vulnerable, but serves ALL filetypes&lt;br /&gt;
-Simply append /sdk to our URL request and we’ve got complete access to Host filesystem (including other Virtual Machines)&lt;br /&gt;
-ESX/ESXi - ALL web servers return ALL filetypes (no /sdk)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Vulnerable Versions&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Server&lt;/i&gt;&lt;br /&gt;
-VMware Server 2.x &amp;lt; 2.0.2 build 203138 (Linux)&lt;br /&gt;
-VMware Server 1.x &amp;lt; 1.0.10 build 203137 (Linux)&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;ESX/ESXi&lt;/i&gt;&lt;br /&gt;
-ESX 3.5 w/o ESX350-200901401-SG&lt;br /&gt;
-ESX 3.0.3 w/o ESX303-200812406-BG&lt;br /&gt;
-ESXi 3.5 w/o ESXe350-200901401-I-SG&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Guest Stealer&lt;/b&gt;&lt;br /&gt;
-Perl script remotely ‘steals’ virtual machines from vulnerable hosts&lt;br /&gt;
-Supports Server, ESX, ESXi&lt;br /&gt;
-Allows attacker to select which Guest to ‘steal’&lt;br /&gt;
-Utilizes VMware configuration files to identify available Guests and determine associated files&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;VMINVENTORY.XML&lt;/b&gt;&lt;br /&gt;
-/etc/vmware/hostd/vmInventory.xml (default location)&lt;br /&gt;
-Gives us Guest inventory &amp;amp; location information&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyEl9gYQEU2-E2tQ5ZH5ATgsZb3qd7WrtVzD1x2Seb-LX0CBMiUSlbxHOpOvPMjxarJuEjbTE-OubyMTRs122yqmy-KuxGEthSZKQ8Ww403SQPpIclzrtesXJ2y_fVgCtmz6tsQlbn5mE/s1600/08-Jun-30-11-pic3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;186&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyEl9gYQEU2-E2tQ5ZH5ATgsZb3qd7WrtVzD1x2Seb-LX0CBMiUSlbxHOpOvPMjxarJuEjbTE-OubyMTRs122yqmy-KuxGEthSZKQ8Ww403SQPpIclzrtesXJ2y_fVgCtmz6tsQlbn5mE/s400/08-Jun-30-11-pic3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2WZn_Trpc-lCWoA2rQw2fOrjpmtLeZXBWh6MutFGzgu2LPfOGRVH8L2vopW8bMjJwToT0aHA6j2-h4J9teSwvrK5Uf7kFmauvCVchqunRB6GZT25KhNz2g_TgHsnBMkPDVOFvJ8xFhvM/s1600/08-Jun-30-11-pic4.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2WZn_Trpc-lCWoA2rQw2fOrjpmtLeZXBWh6MutFGzgu2LPfOGRVH8L2vopW8bMjJwToT0aHA6j2-h4J9teSwvrK5Uf7kFmauvCVchqunRB6GZT25KhNz2g_TgHsnBMkPDVOFvJ8xFhvM/s400/08-Jun-30-11-pic4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Mitigation&lt;/b&gt;&lt;br /&gt;
-Patch, patch, patch&lt;br /&gt;
-Hosts are an attractive target (compromise one = access many)&lt;br /&gt;
-Better yet...Segment, segment, segment&lt;br /&gt;
-Segment management interfaces&lt;br /&gt;
-Segment systems of different security levels&lt;br /&gt;
-Don’t share physical NICs between different security levels&lt;br /&gt;
-Virtualization is not always the &quot;best answer&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Credits&lt;/u&gt;:&amp;nbsp; Justin Morehouse @ ShmooCon</description><link>http://ethicalhackernet.blogspot.com/2011/06/attacking-vmware-guest-machines.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJaHZGHbOMqWzC6dI0xwug4p6dcmNmDyjr3Tv2aZonpjypKCNAmbXN6knx8vVP1w7G5c7zbZYW3qs69-T3O-GUE5-lFqqZWAmJjegIrPGYYlb3LrJ7kVNVygtfaURspq8OhdcmtuHn5ps/s72-c/08-Jun-30-11-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-563285091644016013</guid><pubDate>Tue, 28 Jun 2011 23:55:00 +0000</pubDate><atom:updated>2011-06-28T19:25:02.985-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cloud assessment</category><category domain="http://www.blogger.com/atom/ns#">cloud av scanning</category><category domain="http://www.blogger.com/atom/ns#">cloud hack</category><category domain="http://www.blogger.com/atom/ns#">cloud IDS</category><category domain="http://www.blogger.com/atom/ns#">cloud IPS</category><category domain="http://www.blogger.com/atom/ns#">cloud malicious url</category><category domain="http://www.blogger.com/atom/ns#">cloud malware</category><category domain="http://www.blogger.com/atom/ns#">cloud rbl</category><category domain="http://www.blogger.com/atom/ns#">Cloud Security</category><category domain="http://www.blogger.com/atom/ns#">Cloud security issues</category><category domain="http://www.blogger.com/atom/ns#">cloud spam</category><title>Broad View of Cloud Security</title><description>Cloud Computing in the security industry has multiple definitions and several approaches:&lt;br /&gt;
&lt;blockquote&gt;-URL scanning&lt;br /&gt;
-AV scanning&lt;br /&gt;
-Spam scanning&lt;br /&gt;
-RBL&lt;br /&gt;
-and more...&lt;/blockquote&gt;&lt;br /&gt;
&lt;b&gt;Cloud Paradigm&lt;/b&gt;&lt;br /&gt;
-Pro Cloud&lt;br /&gt;
-Against Cloud&lt;br /&gt;
-A hybrid approach is better&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Strenghts&lt;/b&gt;&lt;br /&gt;
-No versioning (no large product updates)&lt;br /&gt;
-Low resource consumption&lt;br /&gt;
-Higher speed&lt;br /&gt;
-Not OS dependant&lt;br /&gt;
-Not hardware dependant&lt;br /&gt;
-Instant access to updates&lt;br /&gt;
-New technologies available like outbreak detection or statistics based algorithms&lt;br /&gt;
-Sometimes...It is also cheaper&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Weaknesses&lt;/b&gt;&lt;br /&gt;
-No internet connection means no cloud&lt;br /&gt;
-Susceptible to DDOS attacks&lt;br /&gt;
-Resource Consumption just moved in the cloud. It didn’t vanished!&lt;br /&gt;
-Connection spikes can cause false negatives (or, even self-DDOS)&lt;br /&gt;
-Instant updates can also mean instant faulty updates&lt;br /&gt;
-Data center failure means no detection&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What Else Can Cloud Offer?&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Opens the door to a new set of:&lt;/i&gt;&lt;br /&gt;
-Applications&lt;br /&gt;
-Devices&lt;br /&gt;
-Operating systems&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Size Does Matter&lt;/b&gt;&lt;br /&gt;
-Several sources of URLs means an extremely large number of URLs&lt;br /&gt;
-Several clients that query the cloud means a massive number of links that have to be analyzed&lt;br /&gt;
-Links have various statuses (clean, infected, phishing, fraud) which change dynamically&lt;br /&gt;
-So, one has to move fast...&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Lies, Damned Lies and Statistics&lt;/b&gt;&lt;br /&gt;
-Targeted attacks stay under the radar&lt;br /&gt;
-Slow spreading malware too&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Not everybody likes us&lt;/b&gt;&lt;br /&gt;
-Website owners&lt;br /&gt;
-ISPs&lt;br /&gt;
-Maybe even social networks?&lt;br /&gt;
-And hopefully the bad guys (i.e. Hackers)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;
-We believe that a hybrid approach is best&lt;br /&gt;
-The cloud should be used as another filtering method and not as a universal solution&lt;br /&gt;
-Not only there should be a hybrid approach, but also these techniques have to be interconnected&lt;br /&gt;
-Although it looks quite easy in theory, creating and maintaining a cloud architecture is not an easy process</description><link>http://ethicalhackernet.blogspot.com/2011/06/broad-view-of-cloud-security.html</link><author>noreply@blogger.com (S. Ali)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-6828669543582510159</guid><pubDate>Thu, 16 Jun 2011 00:44:00 +0000</pubDate><atom:updated>2011-06-15T20:14:21.130-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ACSServer.exe</category><category domain="http://www.blogger.com/atom/ns#">Android attack</category><category domain="http://www.blogger.com/atom/ns#">Blackberry Security</category><category domain="http://www.blogger.com/atom/ns#">Code Signing</category><category domain="http://www.blogger.com/atom/ns#">Etisalat mobile hack</category><category domain="http://www.blogger.com/atom/ns#">FlexiSpy</category><category domain="http://www.blogger.com/atom/ns#">mobile backdoor</category><category domain="http://www.blogger.com/atom/ns#">Mobile Spy</category><category domain="http://www.blogger.com/atom/ns#">Mobile Spyware</category><category domain="http://www.blogger.com/atom/ns#">Phone Number Farming</category><category domain="http://www.blogger.com/atom/ns#">Phonesnoop</category><title>Advanced Mobile Spyware</title><description>&lt;b&gt;Mobile Spyware &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
-Often includes modifications to legitimate programs designed to compromise the device or device data&lt;br /&gt;
-Often inserted by those who have legitimate access to source code or distribution binaries&lt;br /&gt;
-May be intentional or inadvertent&lt;br /&gt;
-Not specific to any particular programming language&lt;br /&gt;
-Not specific to any particular mobile Operating System&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Attacker Motivation&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Practical method of compromise for many systems&lt;/i&gt;&lt;br /&gt;
–Let the users install your backdoor on systems you have no access to&lt;br /&gt;
–Looks like legitimate software so may bypass mobile AV&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Retrieve and manipulate valuable private data&lt;/i&gt;&lt;br /&gt;
–Looks like legitimate application traffic so little risk of detection&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;
For high value targets such as financial services and government it becomes cost effective and more reliable&lt;/i&gt;&lt;br /&gt;
–High-end attackers will not be content to exploit opportunistic vulnerabilities, which might be fixed and therefore unavailable at a critical juncture. They may seek to implant vulnerability for later exploitation&lt;br /&gt;
–Think &quot;Aurora&quot; for Mobile Devices&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUPqcnupZBA4EQSrhmgNa5iyAwhQoxUT3aW8hWcLjCCSA_Il9OgcK58SOPidVqkUB9wWfuNw9YtczcCGdai_bH-qF_cJVae5cL0_zpbfa9mlmggk98hr3RlRLalrI6xo-bh5jU58UWeCI/s1600/06-Jun-16-11-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUPqcnupZBA4EQSrhmgNa5iyAwhQoxUT3aW8hWcLjCCSA_Il9OgcK58SOPidVqkUB9wWfuNw9YtczcCGdai_bH-qF_cJVae5cL0_zpbfa9mlmggk98hr3RlRLalrI6xo-bh5jU58UWeCI/s400/06-Jun-16-11-pic1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;FlexiSpy&lt;/b&gt;&lt;br /&gt;
http://www.flexispy.com&lt;br /&gt;
$149 -$350 PER YEAR depending on features&lt;br /&gt;
Features:&lt;br /&gt;
–Remote Listening&lt;br /&gt;
–C&amp;amp;C Over SMS&lt;br /&gt;
–SMS and Email Logging&lt;br /&gt;
–Call History Logging&lt;br /&gt;
–Location Tracking&lt;br /&gt;
–Call Interception&lt;br /&gt;
–GPS Tracking&lt;br /&gt;
–Symbian, Blackberry, Windows Mobile Supported&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Mobile Spy&lt;/b&gt;&lt;br /&gt;
http://www.mobile-spy.com&lt;br /&gt;
$49.97 PER QUARTER or $99.97 PER YEAR&lt;br /&gt;
Features:&lt;br /&gt;
–SMS Logging&lt;br /&gt;
–Call Logging&lt;br /&gt;
–GPS Logging&lt;br /&gt;
–Web URL Logging&lt;br /&gt;
–BlackBerry, iPhone(JailbrokenOnly), Android, Windows Mobile or Symbian&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Etisalat (SS8)&lt;/b&gt;&lt;br /&gt;
-Cell carrier in United Arab Emirates (UAE)&lt;br /&gt;
-Pushed via SMS as &quot;software patch&quot; for Blackberry smartphones&lt;br /&gt;
-Upgrade urged to &quot;enhance performance&quot; of Blackberry service&lt;br /&gt;
-Blackberry PIN messaging as C&amp;amp;C&lt;br /&gt;
-Sets FLAG_HIDDEN bit to true&lt;br /&gt;
-Interception of outbound email / SMS only&lt;br /&gt;
-Discovered due to flooded listener server cause retries that drained batteries of affected devices&lt;br /&gt;
-Accidentally released the .jar as well as the .cod (ooopsie?!)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Bugs &amp;amp; Phonesnoop&lt;/b&gt;&lt;br /&gt;
–Exfiltration of inbound and outbound email&lt;br /&gt;
–Hidden&lt;br /&gt;
–Remotely turn on a Blackberry phone microphone&lt;br /&gt;
–Listen in on target ambient conversation&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Storm8 Phone Number Farming&lt;/b&gt;&lt;br /&gt;
–iMobstersand Vampires Live (and others)&lt;br /&gt;
–&quot;Storm8 has written the software for all its games in such a way that it automatically accesses, collects, and transmits the wireless telephone number of each iPhoneuser who downloads any Storm8 game,&quot; the suit alleges. &quot;... Storm8, though, has no reason whatsoever to access the wireless phone numbers of the iPhones on which its games are installed.&quot;&lt;br /&gt;
–&quot;Storm8 says that this code was used in development tests, only inadvertently remained in production builds, and removed as soon as it was alerted to the issue.&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Symbian Sexy Space&lt;/b&gt;&lt;br /&gt;
–Poses as legitimate server ACSServer.exe&lt;br /&gt;
–Calls itself &#39;Sexy Space&#39;&lt;br /&gt;
–Steals phone and network information&lt;br /&gt;
–Exfiltrates data via hacker owned web site connection&lt;br /&gt;
–Can SPAM contact list members&lt;br /&gt;
–Basically a &quot;botnet&quot; for mobile phones&lt;br /&gt;
–Signing process: Anti-virus scan using F-Secure (Approx 43% proactive detection rate (PCWorld))&lt;br /&gt;
-Random selection of inbound manually assessed&lt;br /&gt;
–Symbiansigned this binary as safe!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;09Droid –Banking Applications Attack&lt;/b&gt;&lt;br /&gt;
–Droid app that masquerades as any number of different target banking applications&lt;br /&gt;
–Target banks included: Royal Bank of Canada, Chase, BB&amp;amp;T, SunTrust, Over 50 total financial institutions were affected&lt;br /&gt;
–May steal and exfiltrate banking credentials&lt;br /&gt;
–Approved and downloaded from Google’s Android Marketplace!&lt;br /&gt;
–http://www.theinquirer.net/inquirer/news/1585716/fraud-hits-android-apps-market&lt;br /&gt;
–http://www.pcadvisor.co.uk/news/index.cfm?RSS&amp;amp;NewsID=3209953&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Blackberry Takes Security Seriously&lt;/b&gt;&lt;br /&gt;
-KB05499: &lt;i&gt;Protecting the BlackBerry smartphoneand BlackBerry Enterprise Server against malware:&lt;/i&gt; http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;amp;docType=kc&amp;amp;externalId=KB05499&lt;br /&gt;
-&lt;i&gt;Protecting the BlackBerry device platform against malware&lt;/i&gt;: http://docs.blackberry.com/en/admin/deliverables/1835/Protectingthe BlackBerry device platform against malware.pdf&lt;br /&gt;
-&lt;i&gt;Placing the BlackBerry Enterprise Solution in a segmented network&lt;/i&gt;: http://docs.blackberry.com/en/admin/deliverables/1460/Placing_the_BlackBerry_Enterprise_Solution_in_a_Segmented_Network.pdf&lt;br /&gt;
-&lt;i&gt;BlackBerry Enterprise Server Policy Reference Guide&lt;/i&gt;: http://docs.blackberry.com/en/admin/deliverables/7228/Policy_Reference_Guide.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Does It Really Matter?&lt;/b&gt;&lt;br /&gt;
-Only 23% of smartphone owners use the security software installed on the devices.&lt;br /&gt;
(&lt;i&gt;Source: Trend Micro Inc. survey of 1,016 U.S. smartphoneusers, June 2009&lt;/i&gt;)&lt;br /&gt;
-13% of organizations currently protect from mobile viruses&lt;br /&gt;
(&lt;i&gt;Mobile Security 2009 Survey by Goode Intelligence&lt;/i&gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Code Signing&lt;/b&gt;&lt;br /&gt;
-Subset of Blackberry API considered &quot;controlled&quot;&lt;br /&gt;
-Use of controlled package, class, or method requires appropriate code signature&lt;br /&gt;
-Blackberry Signature Tool comes with the Blackberry JDE&lt;br /&gt;
-Acquire signing keys by filling out a web form and paying $20&lt;br /&gt;
–This not is a high barrier to entry&lt;br /&gt;
–48 hours later you receive signing keys&lt;br /&gt;
-Install keys into signature tool&lt;br /&gt;
-Hash of code sent to RIM for API tracking purposes only&lt;br /&gt;
-RIM does not get source code&lt;br /&gt;
-COD file is signed based on required keys&lt;br /&gt;
-Application ready to be deployed&lt;br /&gt;
-Easy to acquire anonymous keys&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;IT Policies&lt;/b&gt;&lt;br /&gt;
-Requires connection to Blackberry Enterprise Server (BES)&lt;br /&gt;
-Supersedes lower levels of security restrictions&lt;br /&gt;
-Prevent devices from downloading third-party applications over wireless&lt;br /&gt;
-Prevent installation of specific third-party applications&lt;br /&gt;
-Control permissions of third party applications&lt;br /&gt;
–Allow Internal Connections&lt;br /&gt;
–Allow Third-Party Apps to Use Serial Port&lt;br /&gt;
–Allow External Connections&lt;br /&gt;
-MOSTLY &quot;Default Allow All&quot; policy for BES and non-BES devices&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Application Policies&lt;/b&gt;&lt;br /&gt;
-Can be controlled at the BES&lt;br /&gt;
-If no BES present, controls are set on the handheld itself&lt;br /&gt;
-Can only be MORE restrictive than the IT policy, never less&lt;br /&gt;
-Control individual resource access per application&lt;br /&gt;
-Control individual connection access per application&lt;br /&gt;
-MOSTLY &quot;Default Allow All&quot; policy for BES and non-BES devices&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Installation Files&lt;/b&gt;&lt;br /&gt;
-.COD files:A COD file is a proprietary file format developed by RIM that contains compiled and packaged application code.&lt;br /&gt;
-.JAD files:An application descriptor that stores information about the application itself and the location of .COD files&lt;br /&gt;
-.JAR files:a JAR file (or Java ARchive) is used for aggregating many files into one. It is generally used to distribute Java classes and associated metadata.&lt;br /&gt;
-.ALX files:Similar to the .JAD file, in that it holds information about where the installation files for the application are located&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;txsBBSpy Logging and Dumping&lt;/b&gt;&lt;br /&gt;
-Monitor connected / disconnected calls&lt;br /&gt;
-Monitor PIM added / removed / updated&lt;br /&gt;
-Monitor inboundSMS&lt;br /&gt;
-Monitor outbound SMS&lt;br /&gt;
-Real Time trackGPS coordinates&lt;br /&gt;
-Dump all contacts&lt;br /&gt;
-Dump current location&lt;br /&gt;
-Dump phone logs&lt;br /&gt;
-Dumpemail&lt;br /&gt;
-Dump microphone capture (security prompted)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;txsBBSpy Exfiltration and C&amp;amp;C Methods&lt;/b&gt;&lt;br /&gt;
-SMS (No CDMA)&lt;br /&gt;
-SMS Datagrams(Supports CDMA)&lt;br /&gt;
-Email&lt;br /&gt;
-HTTP GET&lt;br /&gt;
-HTTP POST&lt;br /&gt;
-TCP Socket&lt;br /&gt;
-UDP Socket&lt;br /&gt;
-Command and control hard codedto inbound SMS&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Future Work (Offensive AND Defensive)&lt;/b&gt;&lt;br /&gt;
-Reverse engineer .cod file format&lt;br /&gt;
-Continued research into unobstructed installation methods (requires exploitation)&lt;br /&gt;
-Infect PC with virus that acts as distribution hub&lt;br /&gt;
-Research additional exfiltration methods for tunneling without prompting</description><link>http://ethicalhackernet.blogspot.com/2011/06/advanced-mobile-spyware.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUPqcnupZBA4EQSrhmgNa5iyAwhQoxUT3aW8hWcLjCCSA_Il9OgcK58SOPidVqkUB9wWfuNw9YtczcCGdai_bH-qF_cJVae5cL0_zpbfa9mlmggk98hr3RlRLalrI6xo-bh5jU58UWeCI/s72-c/06-Jun-16-11-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-6647242016419904718</guid><pubDate>Wed, 15 Jun 2011 00:39:00 +0000</pubDate><atom:updated>2011-06-14T20:09:42.906-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ARM</category><category domain="http://www.blogger.com/atom/ns#">ASLR</category><category domain="http://www.blogger.com/atom/ns#">AVC voting machine</category><category domain="http://www.blogger.com/atom/ns#">buffer overflows</category><category domain="http://www.blogger.com/atom/ns#">DEPlib automatic instruction</category><category domain="http://www.blogger.com/atom/ns#">non-executable memory</category><category domain="http://www.blogger.com/atom/ns#">ret2lib exploit</category><category domain="http://www.blogger.com/atom/ns#">return-oriented programming</category><category domain="http://www.blogger.com/atom/ns#">rop</category><category domain="http://www.blogger.com/atom/ns#">ROP functions</category><category domain="http://www.blogger.com/atom/ns#">smashing the stack</category><title>Automated Independent Gadget Search</title><description>&lt;b&gt;Goal&lt;/b&gt;&lt;br /&gt;
The goal of this research is to be able to use return-oriented programming platform independently across multiple platforms.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Motivation&lt;/b&gt;&lt;br /&gt;
-CPU Architecture diversity is increasing.&lt;br /&gt;
-We want to execute code on machines despite the presence of non-executable memory, but we do not aim for ASLR.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;History&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOZSGLskyAWcB1iktks8_NeQdhJBbeyh3dUUFOR2ZLW23ecfGh792YrkUkXirvX5U6009zng97-RdGyxHBbk_f2JxB_egRLFz8d8wMu3S7OC5ZIn_P5PswnpzYtz5Zmxc8oeiNfGG_Mhc/s1600/05-Jun-15-11-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;261&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOZSGLskyAWcB1iktks8_NeQdhJBbeyh3dUUFOR2ZLW23ecfGh792YrkUkXirvX5U6009zng97-RdGyxHBbk_f2JxB_egRLFz8d8wMu3S7OC5ZIn_P5PswnpzYtz5Zmxc8oeiNfGG_Mhc/s400/05-Jun-15-11-pic1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Strategy&lt;/b&gt;&lt;br /&gt;
-Use only already present code&lt;br /&gt;
-No single instruction / return like approach&lt;br /&gt;
-Use REIL to be platform independent&lt;br /&gt;
-Use &quot;free-branch&quot; instructions rather than ret only&lt;br /&gt;
-&quot;Find all first, then filter useful ones&quot; approach&lt;br /&gt;
-Keep an eye on side-effects and minimize them&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Small RISC instruction set:&lt;/b&gt;&lt;br /&gt;
-17 instructions for arithmetic, control flow and misc functionality&lt;br /&gt;
-Instructions are always side-effect free&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Interpreter:&lt;/b&gt;&lt;br /&gt;
-Virtually unlimited memory and temporary registers&lt;br /&gt;
-Implemented as a register machine&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;No support for:&lt;/b&gt;&lt;br /&gt;
-Exceptions, floating point instructions, 64Bit instructions yet&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Algorithms&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiScqEDTNvMOaFCec03PamRww_Z_ADdlzHUJKZBEqtAc17SAgsTe8XE1JDe4wtz76vIrCcp-mpc46tdioBrYjT0ounTOGnJdNM_dzB_VWLEuIpcj1h77zCRVsxDsN8OfJoBEPL0yyUn_4E/s1600/05-Jun-15-11-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiScqEDTNvMOaFCec03PamRww_Z_ADdlzHUJKZBEqtAc17SAgsTe8XE1JDe4wtz76vIrCcp-mpc46tdioBrYjT0ounTOGnJdNM_dzB_VWLEuIpcj1h77zCRVsxDsN8OfJoBEPL0yyUn_4E/s320/05-Jun-15-11-pic2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Algorithms stage I&lt;/b&gt;&lt;br /&gt;
Collect data from the binary:&lt;br /&gt;
1.&lt;i&gt;Extract expression trees from native instructions&lt;/i&gt;&lt;br /&gt;
-Handlers for each possible REIL instruction&lt;br /&gt;
-Most of the handlers are simple transformations&lt;br /&gt;
-Memory store and conditional execution need special treatment&lt;br /&gt;
&lt;br /&gt;
2.&lt;i&gt;Extract path information&lt;/i&gt;&lt;br /&gt;
-Path is extracted in reverse control flow order&lt;br /&gt;
-We want to have all possible outcomes for a conditional execution in a single expression tree&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Algorithms stage II&lt;/b&gt;&lt;br /&gt;
Merge the collected data from stage I:&lt;br /&gt;
1.&lt;i&gt;Combine the expression trees for single native instructions along a path&lt;/i&gt;&lt;br /&gt;
&lt;pre style=&quot;background-image: URL(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAXEf57EmTbLDVAzpe3upnF6n4pi2FzAthh_W4zSz3gGRsB58_8iIgNXDHfpvb4Nla86ulmb4oDAx0889Ke9EvCWrzccwW97L-l0j-YmnX8m1i-d2qoruc1nuOUUsGdtcJ4HBaiT1H2JzY/s320/codebg.gif); background: #f0f0f0; border: 1px dashed #CCCCCC; color: black; font-family: arial; font-size: 12px; height: auto; line-height: 20px; overflow: auto; padding: 0px; text-align: left; width: 99%;&quot;&gt;&lt;code style=&quot;color: black; word-wrap: normal;&quot;&gt;1:  0x00000001 ADD R0, R1, R2  
2:  0x00000002 STR R0, R4  
3:  0x00000003 LDMFD SP! {R4,LR}  
4:  0x00000004 BX LR  
&lt;/code&gt;&lt;/pre&gt;&lt;br /&gt;
2.&lt;i&gt;Determine jump conditions on the path&lt;/i&gt;&lt;br /&gt;
3.&lt;i&gt;Simplify the result&lt;/i&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnJzMyQslanUN11EwX8Xm_eLpjl7teLj7qH_QQPUXYUJDVXEssv0RaCcirSnXDrhAZKjjual4zmZZrWzIeueyTVC-OUhXXBpxP-8bjnVTPlL0SEg7yTSs6XS6oy3gKh256POZKs5PPiys/s1600/05-Jun-15-11-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnJzMyQslanUN11EwX8Xm_eLpjl7teLj7qH_QQPUXYUJDVXEssv0RaCcirSnXDrhAZKjjual4zmZZrWzIeueyTVC-OUhXXBpxP-8bjnVTPlL0SEg7yTSs6XS6oy3gKh256POZKs5PPiys/s400/05-Jun-15-11-pic3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Algorithms stage III&lt;/b&gt;&lt;br /&gt;
Goal of the stage III algorithms:&lt;br /&gt;
-Search for useful gadgets in the merged data. Use a tree match handler for each operation.&lt;br /&gt;
-Select the simplest gadget for each operation. Use a complexity value to determine the gadget which is least complex (side-effects).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Results&lt;/b&gt;&lt;br /&gt;
-Algorithms for platform independent return-oriented programming are possible&lt;br /&gt;
-We are able to find all necessary gadgets for return-oriented programming using our tool&lt;br /&gt;
-Searching for gadgets is not only platform but also very compiler dependent&lt;br /&gt;
-Minimizing side-effects is possible if the right approach is chosen&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Future work&lt;/b&gt;&lt;br /&gt;
-Abstract gadget description language&lt;br /&gt;
-Automatic gadget compiler for all platforms&lt;br /&gt;
-Bring more platforms to REIL&lt;br /&gt;
-Better understand the implications of different compilers</description><link>http://ethicalhackernet.blogspot.com/2011/06/automated-independent-gadget-search.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOZSGLskyAWcB1iktks8_NeQdhJBbeyh3dUUFOR2ZLW23ecfGh792YrkUkXirvX5U6009zng97-RdGyxHBbk_f2JxB_egRLFz8d8wMu3S7OC5ZIn_P5PswnpzYtz5Zmxc8oeiNfGG_Mhc/s72-c/05-Jun-15-11-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-9165467525712031220</guid><pubDate>Mon, 25 Apr 2011 00:48:00 +0000</pubDate><atom:updated>2011-04-24T20:18:54.393-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber weapon</category><category domain="http://www.blogger.com/atom/ns#">cyberwarfare</category><category domain="http://www.blogger.com/atom/ns#">digital domination</category><category domain="http://www.blogger.com/atom/ns#">espionage office documents</category><category domain="http://www.blogger.com/atom/ns#">k-ary malware</category><category domain="http://www.blogger.com/atom/ns#">malicious office documents</category><category domain="http://www.blogger.com/atom/ns#">malicious PDF</category><category domain="http://www.blogger.com/atom/ns#">office macro security</category><category domain="http://www.blogger.com/atom/ns#">office malware</category><category domain="http://www.blogger.com/atom/ns#">trojan infected document</category><title>Office Documents: New Cyber Weapons</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;b&gt;Reallity of cyberwarfare&lt;/b&gt;&lt;br /&gt;
-August 2007: Espionage case of China against German chancelery. 163 Gb of Gouvernemental data stolen through a Trojan-infected Office document.&lt;br /&gt;
-2009 to 2010: Chinese hackers succeeded in stealing economic and financial data from European Banks, through malicious PDFs.&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Document as cyberweapons&lt;/b&gt;&lt;br /&gt;
-(Open)Office document are good vectors&lt;br /&gt;
-PDF documents are also used nowadays&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Cyberwarfare Show&lt;/b&gt;&lt;br /&gt;
-PWN2KILL, May 2010 Paris, challenge has proved the risk is real and high.&lt;br /&gt;
&lt;a href=&quot;http://www.esiea-recherche.eu/iawacs2010.html&quot;&gt;http://www.esiea-recherche.eu/iawacs2010.html&lt;/a&gt;&lt;br /&gt;
-Huge technical possibilities on one side, quite no protection and detection capability on the other side.&lt;br /&gt;
-Many critical systems are rather secure with a strong security policy enforced.&lt;br /&gt;
-Classical approaches are less and less possible, not say impossible.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Which applications are concerned?&lt;/b&gt;&lt;br /&gt;
-Office 2010&lt;br /&gt;
-OpenOffice 3.x&lt;br /&gt;
-All other office applications&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What is the Purpose?&lt;/b&gt;&lt;br /&gt;
-To install malicious payload into the operating system, whithout being detected by any AV.&lt;br /&gt;
-We do not want to exploit any vulnerability (target = secure sensitive systems e.g. combat systems).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Macro Security in MSO&lt;/b&gt;&lt;br /&gt;
Possible level of security:&lt;br /&gt;
Level 4 (0x00000004): Disable all macros without notification.&lt;br /&gt;
Level 3 (0x00000002): Disable all macros with notifiation.&lt;br /&gt;
Level 2 (0x00000003): Disable all macros except digitally signed macros.&lt;br /&gt;
Level 1 (0x00000001): Enable all macros.&lt;br /&gt;
&lt;br /&gt;
Location of settings:&lt;br /&gt;
Registery key : HKEY_CURRENT_USER\Software\Microsoft\Office\ 12.0\ &lt;application&gt; \Security&lt;br /&gt;
Application = {Word, Excel, Powerpoint, Access}&lt;br /&gt;
&lt;br /&gt;
Trusted location:&lt;br /&gt;
A trusted location is a directory where macros of documents stored inside are allowed to be executed automatically.&lt;/application&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Macro Security in OpenOffice&lt;/b&gt;&lt;br /&gt;
Security settings:&lt;br /&gt;
Both Macro security level and trusted location are defined in &quot;Common.xcu&quot; file at:&lt;br /&gt;
Openoffice.org\3\user\registery\data\org\openoffice\Office&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;pre style=&quot;background: url(&amp;quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAXEf57EmTbLDVAzpe3upnF6n4pi2FzAthh_W4zSz3gGRsB58_8iIgNXDHfpvb4Nla86ulmb4oDAx0889Ke9EvCWrzccwW97L-l0j-YmnX8m1i-d2qoruc1nuOUUsGdtcJ4HBaiT1H2JzY/s320/codebg.gif&amp;quot;) repeat scroll 0% 0% rgb(240, 240, 240); border: 1px dashed rgb(204, 204, 204); color: black; font-family: arial; font-size: 12px; height: auto; line-height: 20px; overflow: auto; padding: 0px; text-align: left; width: 99%;&quot;&gt;&lt;code style=&quot;color: black; word-wrap: normal;&quot;&gt;1:  &amp;lt;node oor:name=&quot;Security&quot;&amp;gt;  
2:  &amp;lt;node oor:name=&quot;Scripting&quot;&amp;gt;  
3:  &amp;lt;prop oor:name=&quot;MacroSecurityLevel&quot; oor:type=&quot;xs:int&quot;&amp;gt;  
4:  &amp;lt;value&amp;gt;0&amp;lt;/value&amp;gt;&amp;lt;/prop&amp;gt;&amp;lt;/node&amp;gt;&amp;lt;/node&amp;gt;  
&lt;/code&gt;&lt;/pre&gt;&lt;br /&gt;
Trusted Location:&lt;br /&gt;
Set the root directory as Trusted location&lt;br /&gt;
&lt;pre style=&quot;background: url(&amp;quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAXEf57EmTbLDVAzpe3upnF6n4pi2FzAthh_W4zSz3gGRsB58_8iIgNXDHfpvb4Nla86ulmb4oDAx0889Ke9EvCWrzccwW97L-l0j-YmnX8m1i-d2qoruc1nuOUUsGdtcJ4HBaiT1H2JzY/s320/codebg.gif&amp;quot;) repeat scroll 0% 0% rgb(240, 240, 240); border: 1px dashed rgb(204, 204, 204); color: black; font-family: arial; font-size: 12px; height: auto; line-height: 20px; overflow: auto; padding: 0px; text-align: left; width: 99%;&quot;&gt;&lt;code style=&quot;color: black; word-wrap: normal;&quot;&gt;1:  &amp;lt;node oor:name=&quot;Security&quot;&amp;gt;  
2:  &amp;lt;node oor:name=&quot;Scripting&quot;&amp;gt;  
3:  &amp;lt;prop oor:name=&quot;SecureURL&quot; oor:type=&quot;oor:string-list&quot;&amp;gt;  
4:  &amp;lt;value&amp;gt;file:///C:/&amp;lt;/value&amp;gt;&amp;lt;/prop&amp;gt;&amp;lt;/node&amp;gt;&amp;lt;/node&amp;gt;  
&lt;/code&gt;&lt;/pre&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;The use of &#39;AutoExec&#39; event with MSO:&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
-Able to naturally bypass the level 2 of execution.&lt;br /&gt;
-Several events are available: AutoNew, Open, Close, Exit, Exec&lt;br /&gt;
-Applied on template named Normal.dotm and stored inside MSO&#39;s users settings file.&lt;br /&gt;
-Execute the macro at opening event even if any macro are not allowed to be executed (Level 2).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;MSO and OO: The integration&lt;/b&gt;&lt;br /&gt;
-Both are based on the W3C specification. But the integration is totally different.&lt;br /&gt;
&lt;br /&gt;
MSO’s integration:&lt;br /&gt;
-Office makes it easier to create signatures.&lt;br /&gt;
-It is possible to create self-signed certificates.&lt;br /&gt;
-They are stored inside _rel\.rel file within the document.&lt;br /&gt;
&lt;br /&gt;
Openoffice’s integration:&lt;br /&gt;
No significant change about signature since 2006, the first study.&lt;br /&gt;
Black Hat 2009, Amstersdam, E.Filiol J.-P. Fizaine, Openoffice v3.x Security Design Weaknesses.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;MSO Case&lt;/b&gt;&lt;br /&gt;
+Change to the lowest level: 0&lt;br /&gt;
Interesting Keys: HKEY_CURRENT_USER&lt;br /&gt;
Path: Software\\Microsoft\\Office\\12.0\\Word\\Security&lt;br /&gt;
Windows API: RegOpenKeyEx, RegSetValueEx, RegCreateKeyEx, RegCloseKey&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiABrhkAwqTft1Ozy3ArlTNrnvYMWXan6k2-2sJzXZQHi0O9ZQ-6LVt3XuTGlKzpZKsE3Sf8Cde9_9ZtImRI1gLHz2M1aquA8rd_hyphenhyphenkIvIFSQwLIrl_WjqRJM9PZrhx-OfVWagRDbg8tL0/s1600/04-Apr-25-11-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;84&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiABrhkAwqTft1Ozy3ArlTNrnvYMWXan6k2-2sJzXZQHi0O9ZQ-6LVt3XuTGlKzpZKsE3Sf8Cde9_9ZtImRI1gLHz2M1aquA8rd_hyphenhyphenkIvIFSQwLIrl_WjqRJM9PZrhx-OfVWagRDbg8tL0/s320/04-Apr-25-11-pic1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
+Set the directory c:\Users as a Trusted Location.&lt;br /&gt;
KEY: HKEY_CURRENT_USER&lt;br /&gt;
Path: Software\\Microsoft\\Office\\12.0\\Word\\Security\\Trusted\\Locations&lt;br /&gt;
Path2: Software\\Microsoft\\Office\\12.0\\Word\\Security\\Trusted\\Locations\\Location3&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbRWfnjOskCUt32WUhn7mGuYPepUGlMRtca7A4Tt1Bs4Z56rdRSQas3kIEFdAPfdixGKCkDgP91e3nfNE6ZgmPrb_coNutnQegG7roALq0JhlOpzb9PBAD5OyfPkkUUkbXAgZSSkQtgbE/s1600/04-Apr-25-11-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;105&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbRWfnjOskCUt32WUhn7mGuYPepUGlMRtca7A4Tt1Bs4Z56rdRSQas3kIEFdAPfdixGKCkDgP91e3nfNE6ZgmPrb_coNutnQegG7roALq0JhlOpzb9PBAD5OyfPkkUUkbXAgZSSkQtgbE/s320/04-Apr-25-11-pic2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihDtoi1g6aPHskXjXAMFhhoYImM10QS1LRpNaJLeX-gTAi89hDjg_s2a-d-cUfeudY6NtBd_7PMrzUT0p9sX3U0c993kk5Jiy2Vrfhri7mjnBz1diG1tMKKBN4bk7I8Ii97JoHUqhyphenhyphenEpg/s1600/04-Apr-25-11-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;121&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihDtoi1g6aPHskXjXAMFhhoYImM10QS1LRpNaJLeX-gTAi89hDjg_s2a-d-cUfeudY6NtBd_7PMrzUT0p9sX3U0c993kk5Jiy2Vrfhri7mjnBz1diG1tMKKBN4bk7I8Ii97JoHUqhyphenhyphenEpg/s320/04-Apr-25-11-pic3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;OpenOffice Case&lt;/b&gt;&lt;br /&gt;
+Change the Macro security level to the lowest: 0&lt;br /&gt;
-Settings are stored in only one file! No use of specific library is needed, the C Standard Library is sufficient.&lt;br /&gt;
-Forge the Path&lt;br /&gt;
-Locate the position inside the file&lt;br /&gt;
-Insert the value:&lt;br /&gt;
&lt;pre style=&quot;background: url(&amp;quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAXEf57EmTbLDVAzpe3upnF6n4pi2FzAthh_W4zSz3gGRsB58_8iIgNXDHfpvb4Nla86ulmb4oDAx0889Ke9EvCWrzccwW97L-l0j-YmnX8m1i-d2qoruc1nuOUUsGdtcJ4HBaiT1H2JzY/s320/codebg.gif&amp;quot;) repeat scroll 0% 0% rgb(240, 240, 240); border: 1px dashed rgb(204, 204, 204); color: black; font-family: arial; font-size: 12px; height: auto; line-height: 20px; overflow: auto; padding: 0px; text-align: left; width: 99%;&quot;&gt;&lt;code style=&quot;color: black; word-wrap: normal;&quot;&gt;1:  &amp;lt;node oor:name=&quot;Security&quot;&amp;gt; &amp;lt;node oor:name=&quot;Scripting&quot;&amp;gt;  
2:  &amp;lt;prop oor:name=&quot;MacroSecurityLevel&quot; oor:type=&quot;xs:int&quot;&amp;gt;  
3:  &amp;lt;value&amp;gt;0&amp;lt;/value&amp;gt; &amp;lt;/prop&amp;gt; &amp;lt;/node&amp;gt; &amp;lt;/node&amp;gt;  
&lt;/code&gt;&lt;/pre&gt;-Update by restart the application&lt;br /&gt;
&lt;br /&gt;
+Trusted Locations&lt;br /&gt;
-Insert the value:&lt;br /&gt;
&lt;pre style=&quot;background: url(&amp;quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAXEf57EmTbLDVAzpe3upnF6n4pi2FzAthh_W4zSz3gGRsB58_8iIgNXDHfpvb4Nla86ulmb4oDAx0889Ke9EvCWrzccwW97L-l0j-YmnX8m1i-d2qoruc1nuOUUsGdtcJ4HBaiT1H2JzY/s320/codebg.gif&amp;quot;) repeat scroll 0% 0% rgb(240, 240, 240); border: 1px dashed rgb(204, 204, 204); color: black; font-family: arial; font-size: 12px; height: auto; line-height: 20px; overflow: auto; padding: 0px; text-align: left; width: 99%;&quot;&gt;&lt;code style=&quot;color: black; word-wrap: normal;&quot;&gt;1:  &amp;lt;node oor:name=&quot;Security&quot;&amp;gt; &amp;lt;node oor:name=&quot;Scripting&quot;&amp;gt;  
2:  &amp;lt;prop oor:name=&quot;SecureURL&quot; oor:type=&quot;oor:string-list&quot;&amp;gt;  
3:  &amp;lt;value&amp;gt;file:///C:/&amp;lt;/value&amp;gt; &amp;lt;/prop&amp;gt; &amp;lt;/node&amp;gt; &amp;lt;/node&amp;gt;  
&lt;/code&gt;&lt;/pre&gt;&lt;br /&gt;
&lt;b&gt;K-ary Malware&lt;/b&gt;&lt;br /&gt;
Malware made of k-different, innocent-looking (from the AV point of view). Each of them can (inter)act independently or not and can either be executed in parallel or in sequential. Not all the parts are necessarily executable. The cumulative action of each part defines the malware action.&lt;br /&gt;
&lt;blockquote&gt;Proof of Concept (PoC):&lt;br /&gt;
E. Filiol, Journal in Computer Virology, 2007.&lt;br /&gt;
Hack.lu 2009, A. Desnos, Implementation of K-ary viruses in Python.&lt;/blockquote&gt;&lt;br /&gt;
&lt;b&gt;Two waves of attack: The use of 2-ary malware&lt;/b&gt;&lt;br /&gt;
Suppose the security level is set to the paranoid mode, it is impossible to change the level from inside the macro. &lt;br /&gt;
&lt;blockquote&gt;Journal in Computer Virology, 2006, D. de Drézigué, J.- P. Fizaine, N. Hansma, In-depth Analysis of the Viral Threats with OpenOffice.org Documents&lt;/blockquote&gt;&lt;br /&gt;
&lt;b&gt;Why this approach?&lt;/b&gt;&lt;br /&gt;
-Attacking (secure) systems becomes really complex. Just exploiting one or more vulnerability does no longer suffice. Installing a functionnally sophisticated program is less and less easy. The solution is to split the viral information into many pieces!&lt;br /&gt;
-Real case: secure systems generally filter and forbid packed binaries/shellcodes.&lt;br /&gt;
-Using 2-ary malware is a powerful alternative.&lt;br /&gt;
-The first executable performs a innocent, generally legitimate simple action.&lt;br /&gt;
-The office document then installs more complex malware transparently and silently.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Protection and Countermeasures&lt;/b&gt;&lt;br /&gt;
-Use of Public Key Infrastructure&lt;br /&gt;
-Whenever self-signed certificates are used. Check the serial number, timestamp and validity systematically. The serial number is supposed to be unique.</description><link>http://ethicalhackernet.blogspot.com/2011/04/office-documents-new-cyber-weapons.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiABrhkAwqTft1Ozy3ArlTNrnvYMWXan6k2-2sJzXZQHi0O9ZQ-6LVt3XuTGlKzpZKsE3Sf8Cde9_9ZtImRI1gLHz2M1aquA8rd_hyphenhyphenkIvIFSQwLIrl_WjqRJM9PZrhx-OfVWagRDbg8tL0/s72-c/04-Apr-25-11-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-1375824329182073608</guid><pubDate>Wed, 06 Apr 2011 23:59:00 +0000</pubDate><atom:updated>2011-04-06T19:29:44.101-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">counterfeited passport</category><category domain="http://www.blogger.com/atom/ns#">counterfeiting payment systems</category><category domain="http://www.blogger.com/atom/ns#">credit card theft</category><category domain="http://www.blogger.com/atom/ns#">data stealing malware</category><category domain="http://www.blogger.com/atom/ns#">email attacks</category><category domain="http://www.blogger.com/atom/ns#">facebook accounts</category><category domain="http://www.blogger.com/atom/ns#">online bank fraud</category><category domain="http://www.blogger.com/atom/ns#">social network threats</category><category domain="http://www.blogger.com/atom/ns#">twitter accounts</category><title>The Black Market of your Digital Data Illustrated</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiStLpgfgBUGr62b4fRawJAs65BvqBWNBLvnYwOKdyNethD3_o3BLRF4QpAqLyrGBpFjM6cbmR00Gnz9FpReUxW0panIrgaNTA-tYc6f_xQIetDYqnxlDXfSXVP9kROU8ZVV-_54OW3l_Q/s1600/03-Apr-07-11-pic4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;247&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiStLpgfgBUGr62b4fRawJAs65BvqBWNBLvnYwOKdyNethD3_o3BLRF4QpAqLyrGBpFjM6cbmR00Gnz9FpReUxW0panIrgaNTA-tYc6f_xQIetDYqnxlDXfSXVP9kROU8ZVV-_54OW3l_Q/s400/03-Apr-07-11-pic4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy34_D3jWO791DH_wBAzIFt01vR8M66kNO5wgBBZoipY9NRSUv6AowmftFwyCtXSs6aa1aanuJcVM0TCcL5WZar_t5eiijtURbF0vTz3UkbYwEbYMdp2elzs3sI-yVixQkDI1wKvp0ssA/s1600/03-Apr-07-11-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;246&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy34_D3jWO791DH_wBAzIFt01vR8M66kNO5wgBBZoipY9NRSUv6AowmftFwyCtXSs6aa1aanuJcVM0TCcL5WZar_t5eiijtURbF0vTz3UkbYwEbYMdp2elzs3sI-yVixQkDI1wKvp0ssA/s400/03-Apr-07-11-pic1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm3kP1xu1uaZG6b7qW9ZdyqPpGv79dDWjx9Z5NeEeTMMsVyAEY24Pk8DmpKxZhp9-JD3UMaP_b28gEL5Fe0QTWkkgXcnJh-Mlksd1YcAEk-QxrWeJuWU3BSYrMJv7jPZHl3EKAOVYjrfI/s1600/03-Apr-07-11-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;203&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm3kP1xu1uaZG6b7qW9ZdyqPpGv79dDWjx9Z5NeEeTMMsVyAEY24Pk8DmpKxZhp9-JD3UMaP_b28gEL5Fe0QTWkkgXcnJh-Mlksd1YcAEk-QxrWeJuWU3BSYrMJv7jPZHl3EKAOVYjrfI/s400/03-Apr-07-11-pic2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGzDWiYIwguQCxXcy_2I9aFqDm3LHvhwgglWt9c02JYDAT4_41lfHBmaFYFDlahjUchjcnPxgPvXAHX0zNJDai8ZAzJD016UbuVngLZQFtfPF2I0nSIkqwYbg6biAFvIL1JB5a0pNEO0s/s1600/03-Apr-07-11-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;241&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGzDWiYIwguQCxXcy_2I9aFqDm3LHvhwgglWt9c02JYDAT4_41lfHBmaFYFDlahjUchjcnPxgPvXAHX0zNJDai8ZAzJD016UbuVngLZQFtfPF2I0nSIkqwYbg6biAFvIL1JB5a0pNEO0s/s400/03-Apr-07-11-pic3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX2oNGvqTfdHjsKlQxesMjsY9R4b1hltNMbCoivuX9hTC-FPu5K6AT_LA2hgUrVXSApsen6cPRtYQEea-dGcLGgpHMBvKTWJKoEsl1pvtNqmd72yezN9jdO8wjPg37xhlU7eEsyFU2TLA/s1600/03-Apr-07-11-pic5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;127&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX2oNGvqTfdHjsKlQxesMjsY9R4b1hltNMbCoivuX9hTC-FPu5K6AT_LA2hgUrVXSApsen6cPRtYQEea-dGcLGgpHMBvKTWJKoEsl1pvtNqmd72yezN9jdO8wjPg37xhlU7eEsyFU2TLA/s400/03-Apr-07-11-pic5.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwjBSZiEgWtP6eJByJcsFKSJqzWX_aMdK8AjD7zYCLny6M4Ejdnu8x_C0IAHeL8LudYNbysxt2a74os3kSy8wbBM1iQSo1tJO3a1wwzIHz0oVpWlSe-ZbeZokIvPN_5Cx2oDZFGbAE7nI/s1600/03-Apr-07-11-pic6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwjBSZiEgWtP6eJByJcsFKSJqzWX_aMdK8AjD7zYCLny6M4Ejdnu8x_C0IAHeL8LudYNbysxt2a74os3kSy8wbBM1iQSo1tJO3a1wwzIHz0oVpWlSe-ZbeZokIvPN_5Cx2oDZFGbAE7nI/s400/03-Apr-07-11-pic6.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioNYs7IKYXk3XE4kUKqXt3D_WpZ9wpCtMpXrpfs8ss89hJwSvKVl-3oFYNv8-c6eGLaNfnktTLfT3oasN0cWQ4NDc7pr4VvL3kxTavZfKXNYTb5dYpbvA5t0FyvCSrcW5QbinlyISBgrg/s1600/03-Apr-07-11-pic7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;245&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioNYs7IKYXk3XE4kUKqXt3D_WpZ9wpCtMpXrpfs8ss89hJwSvKVl-3oFYNv8-c6eGLaNfnktTLfT3oasN0cWQ4NDc7pr4VvL3kxTavZfKXNYTb5dYpbvA5t0FyvCSrcW5QbinlyISBgrg/s400/03-Apr-07-11-pic7.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo7SJfshtyGJ3vMg3SLuegFVr5OzE2KX17_c1B1x6fC7NFY5YqiuZDz3PkW8_rJLb9z6Ovj23QDLgPtBzJ4I_tsE1oEBeptQJZmtjulyCqm4NGFPR0o6D-XHZ3WRxiSi2okanJCZdGohE/s1600/03-Apr-07-11-pic8.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;246&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo7SJfshtyGJ3vMg3SLuegFVr5OzE2KX17_c1B1x6fC7NFY5YqiuZDz3PkW8_rJLb9z6Ovj23QDLgPtBzJ4I_tsE1oEBeptQJZmtjulyCqm4NGFPR0o6D-XHZ3WRxiSi2okanJCZdGohE/s400/03-Apr-07-11-pic8.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7O61FFRqyEDguFhqRjOvfIlrrER0-rWq73AWwRWK1zkmbmpbRa-YTjHbn9hpXp6jsJo8tg8dZajukwqAeM1fARToKJmSwlz_j3_tNdpCLhnDm87dJ5mSltgyvfdIFCHf_C9Fz7oEKQkU/s1600/03-Apr-07-11-pic9.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7O61FFRqyEDguFhqRjOvfIlrrER0-rWq73AWwRWK1zkmbmpbRa-YTjHbn9hpXp6jsJo8tg8dZajukwqAeM1fARToKJmSwlz_j3_tNdpCLhnDm87dJ5mSltgyvfdIFCHf_C9Fz7oEKQkU/s400/03-Apr-07-11-pic9.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOrxd5okGwx3eFJCRZi2V6gBJEyxvkZUGQg8eQfqIjJD1q057aJJETbeRothYdaYhYrRI7O427WelLwGRAMBlWF1rJNI9Yq6Nn7-w5SPSqBXep6-jHm68APBgUywPY5l96np_JIzt-Ppc/s1600/03-Apr-07-11-pic10.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;252&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOrxd5okGwx3eFJCRZi2V6gBJEyxvkZUGQg8eQfqIjJD1q057aJJETbeRothYdaYhYrRI7O427WelLwGRAMBlWF1rJNI9Yq6Nn7-w5SPSqBXep6-jHm68APBgUywPY5l96np_JIzt-Ppc/s400/03-Apr-07-11-pic10.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</description><link>http://ethicalhackernet.blogspot.com/2011/04/black-market-of-your-digital-data.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiStLpgfgBUGr62b4fRawJAs65BvqBWNBLvnYwOKdyNethD3_o3BLRF4QpAqLyrGBpFjM6cbmR00Gnz9FpReUxW0panIrgaNTA-tYc6f_xQIetDYqnxlDXfSXVP9kROU8ZVV-_54OW3l_Q/s72-c/03-Apr-07-11-pic4.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-4164309010476440822</guid><pubDate>Fri, 11 Feb 2011 23:12:00 +0000</pubDate><atom:updated>2011-02-11T18:42:56.699-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">0day attacks</category><category domain="http://www.blogger.com/atom/ns#">anti-virus ineffectiveness</category><category domain="http://www.blogger.com/atom/ns#">Aurora</category><category domain="http://www.blogger.com/atom/ns#">AV detection</category><category domain="http://www.blogger.com/atom/ns#">Bredolab</category><category domain="http://www.blogger.com/atom/ns#">Cutwail botnet</category><category domain="http://www.blogger.com/atom/ns#">email-borne threats</category><category domain="http://www.blogger.com/atom/ns#">Heuristic-based</category><category domain="http://www.blogger.com/atom/ns#">mass-email attacks</category><category domain="http://www.blogger.com/atom/ns#">Polymorphic Viruses</category><category domain="http://www.blogger.com/atom/ns#">Signature-based</category><category domain="http://www.blogger.com/atom/ns#">Skeptic</category><title>Ineffectiveness of AntiVirus Solutions</title><description>&lt;i&gt;Many recent high profile attacks into major software companies, public sector institutions and international organizations.&lt;/i&gt;&lt;br /&gt;
–Aurora attack on Google and 32 other companies last year&lt;br /&gt;
–In all cases: malicious email was sent to victim&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Email-borne threats fall into two general categories:&lt;/i&gt;&lt;br /&gt;
–Mass email attacks&lt;br /&gt;
–Targeted attacks&lt;br /&gt;
Traditional AV increasingly ineffective and heuristic engine is necessary.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Typical Bredolab/Trojan.Sasfis&lt;/i&gt;&lt;br /&gt;
Most prolific family of mass-mailed threats using executable attachment.&lt;br /&gt;
Social engineering lures:&lt;br /&gt;
–Social Media website password reset&lt;br /&gt;
–Western Union or UPS invoice&lt;br /&gt;
–&quot;You have received an E-Card!&quot;&lt;br /&gt;
–Spammed out in very large numbers (Cutwail botnet)&lt;br /&gt;
–Many different payloads&lt;br /&gt;
–13.3% of all Malware stopped by Skeptic&lt;br /&gt;
–Between June 2009 and June 2010 (excluding Phish and links)&lt;br /&gt;
–Typically low AV detection (&amp;lt; 10 on VT)&lt;br /&gt;
–Good social engineering tactics&lt;br /&gt;
–Use of Word or Excel icons&lt;br /&gt;
–Spoof prolific companies (Facebook, UPS, Fedex)&lt;br /&gt;
–Heavy use of server-side polymorphism (SSP) to evade signature-based AV&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEOVtxoUoOxLxZV4SlcCKYhWoLafgyP2MF7gyGVRBsBa5wOuysjpdwb9kRP6Qnz-xKJhn7oOXwkwv3EN3ylCOn_STjYdnJLXEZ_E55HSZ1Il5W9SiHkJq9kDqtzkYtq8s6JR-_Gdkofl0/s1600/02-Feb-11-11-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEOVtxoUoOxLxZV4SlcCKYhWoLafgyP2MF7gyGVRBsBa5wOuysjpdwb9kRP6Qnz-xKJhn7oOXwkwv3EN3ylCOn_STjYdnJLXEZ_E55HSZ1Il5W9SiHkJq9kDqtzkYtq8s6JR-_Gdkofl0/s320/02-Feb-11-11-pic1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Signature-based AV&lt;/i&gt;&lt;br /&gt;
–Create a &quot;signature&quot; for a piece of Malware&lt;br /&gt;
–String(s) of bytes&lt;br /&gt;
–Checksum(s)&lt;br /&gt;
–Very specific&lt;br /&gt;
–Evidence of increased use of SSP&lt;br /&gt;
–In 2008, Symantec created 1,691,323 new malicious code signatures&lt;br /&gt;
–In 2009, 2,895,802 new signatures were created (71% increase)&lt;br /&gt;
–139% increase from 2007 to 2008&lt;br /&gt;
–Not sustainable!&lt;br /&gt;
–Solution: heuristic-based approach&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Signature Development Process&lt;/i&gt;&lt;br /&gt;
&lt;span id=&quot;goog_932344954&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhd43TeJLWN1SqVTHfA4ONiQkmeUWswsznMCebeLLpN87vKvdlfIx6NDcIPfM57Jko7u-SoVO5iXhyphenhyphennrRG6ax6Hfecm-uT2UJCFSZ3dYPFYoNtdMudoul16oD41Mo2SjqdBh85IVy7cpE/s1600/02-Feb-11-11-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;234&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhd43TeJLWN1SqVTHfA4ONiQkmeUWswsznMCebeLLpN87vKvdlfIx6NDcIPfM57Jko7u-SoVO5iXhyphenhyphennrRG6ax6Hfecm-uT2UJCFSZ3dYPFYoNtdMudoul16oD41Mo2SjqdBh85IVy7cpE/s320/02-Feb-11-11-pic2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;i&gt;Heuristic-based Approach&lt;/i&gt;&lt;br /&gt;
–Generic detection&lt;br /&gt;
–Features known to exist in Malware&lt;br /&gt;
–Decision based on extracted features&lt;br /&gt;
–Weighted&lt;br /&gt;
–Cloud based&lt;br /&gt;
–no reactive signature deployment delays&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Polymorphic Viruses&lt;/i&gt;&lt;br /&gt;
–Big problem for AV&lt;br /&gt;
–Many different variants&lt;br /&gt;
–Functionally equivalent&lt;br /&gt;
–Signatures required for each variant&lt;br /&gt;
–Solution: &quot;emulation&quot;&lt;br /&gt;
–Emulate past decryptor stub&lt;br /&gt;
–Sig the static virus body&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Server-side polymorphism (SSP)&lt;/i&gt;&lt;br /&gt;
–Custom encryption routine&lt;br /&gt;
–Decrypt at runtime&lt;br /&gt;
–Generated by a polymorphic engine&lt;br /&gt;
–Hundreds or perhaps thousands of unique variants&lt;br /&gt;
–Random junk instructions&lt;br /&gt;
–API calls&lt;br /&gt;
–Arithmetic&lt;br /&gt;
–EP&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Use in mass-email attacks&lt;/i&gt;&lt;br /&gt;
–Attackers generate a number of unique binaries&lt;br /&gt;
–Change the binary being spammed throughout the attack&lt;br /&gt;
–Problem for any vendor without proactive protection in place&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Bredolab Case Study - 30 March 2010&lt;/i&gt;&lt;br /&gt;
–Standard Bredolab run:&lt;br /&gt;
–Subject: variation of &#39;UPS Delivery Problem NR 18800&#39;&lt;br /&gt;
–Attachment: similarly named &#39;UPS_invoice_1845.exe&#39;&lt;br /&gt;
–relatively small (only 56 observed copies)&lt;br /&gt;
–Started at 19:08:33 GMT (time 0)&lt;br /&gt;
–Last observed sample at 19:36:31&lt;br /&gt;
–Total of 27 min 59s&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Case Study - AV Detection &amp;amp; Response Time&lt;/i&gt;&lt;br /&gt;
–At time 0, AV detection was 0&lt;br /&gt;
–Average response time?&lt;br /&gt;
–661 minutes (11 hours and 1 minute)&lt;br /&gt;
–Remember that the attack only lasted 28 mins&lt;br /&gt;
–This is the average response time&lt;br /&gt;
–INEFFECTIVE&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Aurora and Targeted Attacks (Spear-Phishing)&lt;/i&gt;&lt;br /&gt;
–Aurora/Hydraq&lt;br /&gt;
–Up to 34 different companies compromised in same period using similar techniques&lt;br /&gt;
–Email links to malicious web pages&lt;br /&gt;
–Flaws in Adobe Acrobat Reader&lt;br /&gt;
–Google hackers are back?&lt;br /&gt;
–CVE-2010-2883&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;According to US Department of Defense Cyber Crime Center:&lt;/b&gt;&lt;br /&gt;
&quot;&lt;i&gt;102 breaches of the Pentagon’s agencies, partners and contractors in a two-year period ending August 2009&lt;/i&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDbV2yYQg6H20lCI8ro_CpS_UDkNayZaCjg8J2Cm93YpcIIlEGcqAXjlhqL9HppKmzhTel8AvQga1OitY7yHfKlfB6HjX3aWcdxvgIxzO5wk41YVsGJnF8xZGV-rK1gIFlHYAtnuimywE/s1600/02-Feb-11-11-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;216&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDbV2yYQg6H20lCI8ro_CpS_UDkNayZaCjg8J2Cm93YpcIIlEGcqAXjlhqL9HppKmzhTel8AvQga1OitY7yHfKlfB6HjX3aWcdxvgIxzO5wk41YVsGJnF8xZGV-rK1gIFlHYAtnuimywE/s320/02-Feb-11-11-pic3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Targeted Attack Case Study - 24 March 2010&lt;/i&gt;&lt;br /&gt;
–Targeted attack blocked attempting to exploit CVE-2010-0188 (libTiff)&lt;br /&gt;
–Single copy sent to an individual in a major international organization&lt;br /&gt;
–Co-ordinates governments from around the world&lt;br /&gt;
–Trojanized a clean PDF from a World Cup travel site&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Case Study - AV Detection &amp;amp; Response Time&lt;/i&gt;&lt;br /&gt;
–AV detection was 0&lt;br /&gt;
–One week later, AV detection at 33%&lt;br /&gt;
–Sample sharing, blogged&lt;br /&gt;
–Average response time?&lt;br /&gt;
–3631 minutes (two and a half days)&lt;br /&gt;
–Only takes into account the 33% of vendors that were actually detecting the threat&lt;br /&gt;
–INEFFECTIVE</description><link>http://ethicalhackernet.blogspot.com/2011/02/ineffectiveness-of-antivirus-solutions.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEOVtxoUoOxLxZV4SlcCKYhWoLafgyP2MF7gyGVRBsBa5wOuysjpdwb9kRP6Qnz-xKJhn7oOXwkwv3EN3ylCOn_STjYdnJLXEZ_E55HSZ1Il5W9SiHkJq9kDqtzkYtq8s6JR-_Gdkofl0/s72-c/02-Feb-11-11-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-7063328818153378597</guid><pubDate>Mon, 31 Jan 2011 22:10:00 +0000</pubDate><atom:updated>2011-01-31T17:40:11.019-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ABAP Executable Manipulation</category><category domain="http://www.blogger.com/atom/ns#">ABAP Rootkits</category><category domain="http://www.blogger.com/atom/ns#">enterprise security</category><category domain="http://www.blogger.com/atom/ns#">SAP Cross Site Scripting</category><category domain="http://www.blogger.com/atom/ns#">SAP exploit</category><category domain="http://www.blogger.com/atom/ns#">SAP Penetration Attacks</category><category domain="http://www.blogger.com/atom/ns#">SAP RFC</category><category domain="http://www.blogger.com/atom/ns#">SAP security</category><category domain="http://www.blogger.com/atom/ns#">SAP SQL injection</category><category domain="http://www.blogger.com/atom/ns#">SAP systems</category><title>Targeting SAP Platform Using Trojans and Rootkits</title><description>&lt;b&gt;Typical Enterprise Environment&lt;/b&gt;&lt;br /&gt;
-Has more than a thousand of employees&lt;br /&gt;
-Is a circus of IT Systems&lt;br /&gt;
–Mixture of operating systems, databases, applications and their different versions&lt;br /&gt;
-Decision makers care more about their bonus than the interest of the company&lt;br /&gt;
-Is a political battlefield&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Enterprise Security&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Even a medium level of IT security is too expensive to achieve&lt;/i&gt;&lt;br /&gt;
–Missing asset management (how many Oracle DBs, Windows servers, etc)&lt;br /&gt;
–Tons of security scanning, to few remediation chasing&lt;br /&gt;
–Many of the vulnerabilities cannot be mitigated&lt;br /&gt;
-Obsessed by Cross Site Scripting&lt;br /&gt;
-IT security departments cannot influence security decisions of business applications much, because of political reasons.&lt;br /&gt;
-Nobody cares about the hacked UNIX machine, SQL DB, or others.&lt;br /&gt;
-Defacement and similar security incidents are budget approvers&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;SAP Systems&lt;/b&gt;&lt;br /&gt;
-Business specific&lt;br /&gt;
-Industry solutions&lt;br /&gt;
-Hold the Crown Jewels&lt;br /&gt;
-Are usually extensively customized&lt;br /&gt;
-Less exposure to typical hackers (ABAP)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;SAP Security&lt;/b&gt;&lt;br /&gt;
-Security mostly focuses on authorizations and segregation of duties&lt;br /&gt;
-Intrusion prevention is still a baby&lt;br /&gt;
-Risks are underestimated/general IT Security efforts are typically unbalanced at companies&lt;br /&gt;
-Unlike e.g Active Directory, SAP systems belong to the business, not the IT&lt;br /&gt;
-Security departments usually fail when they are challenged&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIe71wqUViSbtxU4V5YDNUowikLxYblH0VP3WqnvV_Bl8yLs1E0fD6JW9r3BEcGSR4iGhi0xMw5yGGb3PJ0Qpo1Wb7wpe6Kgz5fCvgvk_qiWODqkodJeKAM0Th_3OAWkr-IjiYbCpsfyU/s1600/01-Jan-30-11-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;199&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIe71wqUViSbtxU4V5YDNUowikLxYblH0VP3WqnvV_Bl8yLs1E0fD6JW9r3BEcGSR4iGhi0xMw5yGGb3PJ0Qpo1Wb7wpe6Kgz5fCvgvk_qiWODqkodJeKAM0Th_3OAWkr-IjiYbCpsfyU/s320/01-Jan-30-11-pic1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;RFC (Remote Function Call) protocol lets you run functions remotely&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
–To run; use Java, C, etc. with RFC-SDK or simply execute the test program &quot;startrfc&quot;. Following&lt;br /&gt;
creates a new user with god rights:&lt;br /&gt;
&lt;br /&gt;
startrfc -3 -h 10.1.5.4 -s 05 -c 010 -u ERTUNGA -p CCC42 -F SUSR_RFC_USER_INTERFACE&lt;br /&gt;
-E USER=SATRIANI -E ACTIVITY=01 -E PASSWORD=RUBINA -E USER_TYPE=A -T USER_PROFILES,&lt;br /&gt;
12,r=-&lt;press enter=&quot;&quot;&gt;SAP_ALL&lt;press enter=&quot;&quot;&gt; &lt;press and=&quot;&quot; ctrl-z=&quot;&quot; enter=&quot;&quot;&gt;&lt;br /&gt;
&lt;/press&gt;&lt;/press&gt;&lt;/press&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;There is no exploit involved. Everything is intended functionality.&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
–Beats &quot;RFC users are not a threat because they cannot login via SAPGUI&quot;&lt;br /&gt;
–Time to recheck company’s shared folders and eliminate hardcoded passwords.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;RFC (a.k.a communication) users are thus very very important!&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
–Secure their passwords and make them part of the password change process&lt;br /&gt;
–Don’t forget: GUI (dialog) users which have S_RFC rights can also execute remotely&lt;br /&gt;
–SAP_ALL FOR COMMUNICATION USERS IS A NO GO!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;RFC_READ_TABLE&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
Reads the contents of any table (Including ones with sensitive data e.g salary information)&lt;br /&gt;
Has bugs in converting e.g binary fields&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;SUSR_RFC_USER_INTERFACE&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
Can be used for creating/modifying users&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;RFC_ABAP_INSTALL_AND_RUN&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
-Takes ABAP source lines and executes them&lt;br /&gt;
-Widely known! tighten user authorizations to prevent abuse&lt;br /&gt;
-More restricted in latest NetWeaver Systems&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;RFC can be encapsulated in SOAP messages (SOAP RFC)&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
-Company’s internal proxy suddenly opens the doors to all SAP systems&lt;br /&gt;
-Disable it if not used!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Single Sign-on (SSO2)&lt;/b&gt;&lt;br /&gt;
-Is a convenient feature, not a security feature&lt;br /&gt;
-RTFM: Secure Store and Forward [SSF] documentation&lt;br /&gt;
-Personal Security Environment files hold the private key data&lt;br /&gt;
-If an attacker obtains it, it can create authentication tickets for the victim system. Accepting these tickets is enabled per default. Attacker can logon as any user.&lt;br /&gt;
-The private key container (PSE) can be pin-protected&lt;br /&gt;
-Advice: Disable accepting tickets using relevant profile parameters!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;SQL Injection&lt;/b&gt;-ABAP typically uses parametrized queries (Developers can still specify parts of sql statements dynamically by parentheses)&lt;br /&gt;
-Not dynamic: SELECT ColumnA FROM TableA INTO[...]&lt;br /&gt;
-Dynamic: SELECT(var_ColumName)FROM(var_TableName) INTO[...]WHERE(var_WhereClause)&lt;br /&gt;
-Avoid dynamic statements where possible!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Cross Site Scripting&lt;/b&gt;&lt;br /&gt;
-Proper sanitization/encoding of the input data is the key for self developed web code such as BSPs.&lt;br /&gt;
-If not done, an attacker can do everything related to XSS, plus steal e.g the SSO2 (Authentication) cookies from the clients SSO2 cookies are stateless so client impersonation is a breeze. Avoid using this mechanism without proper controls.&lt;br /&gt;
-If you have F5&#39;s or similar devices, encrypt cookies based on origin IP.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;ABAP Executable Manipulation&lt;/b&gt;&lt;br /&gt;
-Statement: INSERT REPORT&lt;br /&gt;
-Writes custom code to any ABAP program&lt;br /&gt;
-It&#39;s even possible to call an editor to make it more user friendly&lt;br /&gt;
-Very suspicious if found in self-developed code&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RS_REPAIR_SOURCE Executable&lt;/b&gt;&lt;br /&gt;
-Unpatched version does not have authorization checking.&lt;br /&gt;
-People with e.g SE38 rights can execute this and manipulate the system and data of it.&lt;br /&gt;
-Same as ABAP injection, only more convenient.&lt;br /&gt;
-SAP patched it via: SAP Note 1167258: Program RS_REPAIR_SOURCE&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;ABAP Rootkits&lt;/b&gt;&lt;br /&gt;
-It is possible to modify system executables (ABAPs)&lt;br /&gt;
-An attacker can easily infect important ones executables and install an ABAP rootkit&lt;br /&gt;
-SAP has RFC functions that do not require user authentication by default (SRFC Function Group). This could be one candidate.&lt;br /&gt;
-Installed rootkit can give anonymous access to the attacker with functionality such as: Installing&lt;br /&gt;
SAP_ALL users, Manipulating ABAP reports, Running OS commands, Stealing hashes or PSE files, Deleting Logs.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Triple-Penetration Attacks&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Penetration 1: Attacker exploits the weakest system&lt;/i&gt;&lt;br /&gt;
-Typical enterprise setup: Testing/Development ­&amp;gt; Quality Assurance ­&amp;gt; Production&lt;br /&gt;
-Among them, most unprotected are test/development systems&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Penetration 2: Attacker infects clients which connect to the weakest system&lt;/i&gt;&lt;br /&gt;
–Starts with modification/infection of the critical areas such as logon screen ABAP code&lt;br /&gt;
-When admins/developers successfully login, malicious payload is downloaded and executed on these users computers&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Penetration 3: Victim infects all the systems it later connects to&lt;/i&gt;&lt;br /&gt;
-Modification of critical components of the newly accessed SAP systems (Internal production systems, Partner systems, critical systems)&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0KpG0X_pdfWpPQfPVkUU42PQ9S7i3Sd7jutjYG0QGTicZC4jGAtqoB4yBUpyyX5n2oN8vrlyF2fHdzmWN1ZvLB-jjxyNhycEwPgJNpCYKnQXHnonpoS5MXZ_SadgcWdTXbmlQYx1Vz0g/s1600/01-Jan-30-11-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;196&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0KpG0X_pdfWpPQfPVkUU42PQ9S7i3Sd7jutjYG0QGTicZC4jGAtqoB4yBUpyyX5n2oN8vrlyF2fHdzmWN1ZvLB-jjxyNhycEwPgJNpCYKnQXHnonpoS5MXZ_SadgcWdTXbmlQYx1Vz0g/s320/01-Jan-30-11-pic2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How to stay secure&lt;/b&gt;&lt;br /&gt;
-Have proper &quot;check-in&quot; and &quot;leavers process&quot; that take the ABAP developer risks into consideration&lt;br /&gt;
-Audit the code against security vulnerabilities before transporting to production systems&lt;br /&gt;
-Syncing passwords to development systems means, possibility of developers to capture valid passwords for production systems. Avoid it!&lt;br /&gt;
-Get rid of insecure and/or default passwords&lt;br /&gt;
-Disable backwards compatiability of passwords&lt;br /&gt;
-Install the latest security patches</description><link>http://ethicalhackernet.blogspot.com/2011/01/targeting-sap-platform-using-trojans.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIe71wqUViSbtxU4V5YDNUowikLxYblH0VP3WqnvV_Bl8yLs1E0fD6JW9r3BEcGSR4iGhi0xMw5yGGb3PJ0Qpo1Wb7wpe6Kgz5fCvgvk_qiWODqkodJeKAM0Th_3OAWkr-IjiYbCpsfyU/s72-c/01-Jan-30-11-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-6717500590830036458</guid><pubDate>Thu, 28 Oct 2010 03:20:00 +0000</pubDate><atom:updated>2010-10-27T22:50:56.397-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">aircrack-ng suite</category><category domain="http://www.blogger.com/atom/ns#">crack wep</category><category domain="http://www.blogger.com/atom/ns#">crack wpa</category><category domain="http://www.blogger.com/atom/ns#">kismet</category><category domain="http://www.blogger.com/atom/ns#">netstumbler</category><category domain="http://www.blogger.com/atom/ns#">reconnaissance tools</category><category domain="http://www.blogger.com/atom/ns#">visualize airwaves</category><category domain="http://www.blogger.com/atom/ns#">wireless recon</category><category domain="http://www.blogger.com/atom/ns#">wireless visualization</category><title>Wireless Reconnaissance in Practice</title><description>&lt;b&gt;Kismet (stable, devel and newcore)&lt;/b&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Locate / Identify AP(s)&lt;/i&gt;&lt;br /&gt;
-BSSID, ESSID, Channel and Encryption&lt;br /&gt;
-GPS data&lt;br /&gt;
&lt;i&gt;Locate / Identify Client(s)&lt;/i&gt;&lt;br /&gt;
-MAC Address&lt;br /&gt;
-Manufacturers&lt;br /&gt;
Perform Spectrum analysis&lt;br /&gt;
Drones / open-source WIPS&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Aircrack-ng – Cracking WEP and WPA&lt;/b&gt;&lt;br /&gt;
-Suite of tools for wireless testing&lt;br /&gt;
-Mostly thought for wireless cracking&lt;br /&gt;
-Can also be used for wireless recon&lt;br /&gt;
-IE Airodump-ng&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Netstumbler&lt;/b&gt;&lt;br /&gt;
-All for the Win32 geeks.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Types Reconnaissance Data&lt;/b&gt;&lt;br /&gt;
Kismet-(stable|devel) – Txt, CSV, XML, GPS and pcap&lt;br /&gt;
Kismet-newcore – Txt, NetXML, GPS and pcap&lt;br /&gt;
Aircrack-ng – CSV, pcap, XML&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Wireless Recon Visualization Tools&lt;/b&gt;&lt;br /&gt;
-Gpsmap (ancient)&lt;br /&gt;
-Pykismet&lt;br /&gt;
-Kismet-earth&lt;br /&gt;
-kisgearth&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Limitations of Visualization Tools&lt;/b&gt;&lt;br /&gt;
-None work with Kismet-newcore&lt;br /&gt;
-None work with Aircrack-ng&lt;br /&gt;
-Flexible representation of specific information (total flexibility in the generated graphs).</description><link>http://ethicalhackernet.blogspot.com/2010/10/wireless-reconnaissance-in-practice.html</link><author>noreply@blogger.com (S. Ali)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-5695414840828537611</guid><pubDate>Tue, 12 Oct 2010 15:27:00 +0000</pubDate><atom:updated>2010-10-12T10:57:30.699-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">excel</category><category domain="http://www.blogger.com/atom/ns#">malicious document structure</category><category domain="http://www.blogger.com/atom/ns#">malicious documents</category><category domain="http://www.blogger.com/atom/ns#">office malscanner</category><category domain="http://www.blogger.com/atom/ns#">office malware</category><category domain="http://www.blogger.com/atom/ns#">office malware analysis</category><category domain="http://www.blogger.com/atom/ns#">office shellcode</category><category domain="http://www.blogger.com/atom/ns#">officecat</category><category domain="http://www.blogger.com/atom/ns#">offvis</category><category domain="http://www.blogger.com/atom/ns#">powerpoint</category><category domain="http://www.blogger.com/atom/ns#">virus</category><category domain="http://www.blogger.com/atom/ns#">word</category><title>Analyzing Malware Through MS-Office Documents</title><description>&lt;b&gt;Key Highlights&lt;/b&gt;&lt;br /&gt;
-MS Office commonly exploited since 2006&lt;br /&gt;
-Existing exploits in the wild exploit unexceptional the older OLESS file format.&lt;br /&gt;
-Currently no known bugs in the newer XML based MS Office format.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Some MS Office exploits since 2006&lt;/b&gt;&lt;br /&gt;
-CVE-2006-0009 Powerpoint MS06-012 (March 2006)&lt;br /&gt;
-CVE-2006-0022 Powerpoint MS06-028 (June 2006)&lt;br /&gt;
-CVE-2006-2492 Word MS06-027 (June 2006)&lt;br /&gt;
-CVE-2006-3434 Powerpoint MS06-062 (October 2006)&lt;br /&gt;
-CVE-2006-3590 Powerpoint MS06-048 (August 2006)&lt;br /&gt;
-CVE-2006-4534 Word MS06-060 (October 2006)&lt;br /&gt;
-CVE-2006-4694 Powerpoint MS06-058 (October 2006)&lt;br /&gt;
-CVE-2006-5994 Word MS07-014 (February 2007)&lt;br /&gt;
-CVE-2006-6456 Word MS07-014 (February 2007)&lt;br /&gt;
-CVE-2007-0515 Word MS07-014 (February 2007)&lt;br /&gt;
-CVE-2007-0671 Excel MS07-015 (February 2007)&lt;br /&gt;
-CVE-2007-0870 Word MS07-024 (May 2007)&lt;br /&gt;
-CVE-2008-0081 Excel MS08-014 (March 2008)&lt;br /&gt;
-CVE-2008-4841 Word MS09-010 (April 2009)&lt;br /&gt;
-CVE-2009-0238 Excel MS09-009 (April 2009)&lt;br /&gt;
-CVE-2009-0556 Powerpoint MS09-017 (May 2009)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Generic OLESS Format&lt;/b&gt;&lt;br /&gt;
-OLESS Header&lt;br /&gt;
-FAT FS: SectorNumbers, OLESS directory entries&lt;br /&gt;
-Data is divided into directories (storages) and files (streams)&lt;br /&gt;
-Depending on the application streams may contain: Macros, Graphics, Tables, Sounds, Animations, etc.&lt;br /&gt;
-Parsing can be done using the Win32 COM API: StgOpenStorage(), IStoragemethods, IStreammethods.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;Malicious Document Structure&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnQ0-9-Ty47noydjRifGrmidfMzJmdttXonboY6I7o7VRGQXTIHzvIBy2qnq0E2d2WSUm-Sk37C2M-pyvmQ9L2QxjN1pPMSB7gt2qllxY4BtEbp509c1Uh8C8v4XFBf8lsK5iXlZTtU8Y/s1600/15-Oct-12-10-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;216&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnQ0-9-Ty47noydjRifGrmidfMzJmdttXonboY6I7o7VRGQXTIHzvIBy2qnq0E2d2WSUm-Sk37C2M-pyvmQ9L2QxjN1pPMSB7gt2qllxY4BtEbp509c1Uh8C8v4XFBf8lsK5iXlZTtU8Y/s320/15-Oct-12-10-pic1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;Typical MS-Office Shellcode Behavior&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
When a bug in a MS Office application gets triggered:&lt;br /&gt;
-Shellcode executes&lt;br /&gt;
-Finds itself by open file handles enumeration and file size checking&lt;br /&gt;
-SetFilePointerto encrypted PE-File(s), decrypt, drop and execute&lt;br /&gt;
-Drop harmless embedded MS Office document and start to look innocent&lt;br /&gt;
&lt;br /&gt;
More information:&lt;br /&gt;
-Not much public information about MS-Office malware analysis available&lt;br /&gt;
-Microsoft Office Binary File Format Specification (since Feb. 2008)&lt;br /&gt;
-Bruce Dang&#39;s talk &quot;Methods for Understanding Targeted Attacks with Office Documents&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Available Tools For Analysis&lt;/b&gt;&lt;br /&gt;
-&lt;i&gt;DFView &lt;/i&gt;(old school Microsoft OLE structure viewer)&lt;br /&gt;
-&lt;i&gt;Officecat &lt;/i&gt;(signature based CLI utility)&lt;br /&gt;
-&lt;i&gt;FlexHexEditor&lt;/i&gt; (OLE compound viewer)&lt;br /&gt;
-&lt;i&gt;OffVis&lt;/i&gt; (office binary file format visualization tool)&lt;br /&gt;
-&lt;i&gt;OfficeMalScanner &lt;/i&gt;(forensic tool for analysts to find malicious traces in MS Office documents)</description><link>http://ethicalhackernet.blogspot.com/2010/10/analyzing-malware-through-ms-office.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnQ0-9-Ty47noydjRifGrmidfMzJmdttXonboY6I7o7VRGQXTIHzvIBy2qnq0E2d2WSUm-Sk37C2M-pyvmQ9L2QxjN1pPMSB7gt2qllxY4BtEbp509c1Uh8C8v4XFBf8lsK5iXlZTtU8Y/s72-c/15-Oct-12-10-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-4147887143936513042</guid><pubDate>Wed, 25 Aug 2010 22:58:00 +0000</pubDate><atom:updated>2010-08-25T18:28:14.547-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">embedded system side channel attack</category><category domain="http://www.blogger.com/atom/ns#">power em traces</category><category domain="http://www.blogger.com/atom/ns#">side channel attack</category><category domain="http://www.blogger.com/atom/ns#">side channel threat countermeasures</category><category domain="http://www.blogger.com/atom/ns#">smartcard side channel</category><category domain="http://www.blogger.com/atom/ns#">timing analysis</category><category domain="http://www.blogger.com/atom/ns#">xbox 360 backdoor</category><title>Analyzing Side Channel Attacks on Embedded Systems</title><description>&lt;i&gt;General embedded systems based on micro-controller and complex processors:&lt;/i&gt;&lt;br /&gt;
-USB sticks&lt;br /&gt;
-Car locks&lt;br /&gt;
-Remote access tokens&lt;br /&gt;
-Mobile devices&lt;br /&gt;
-Game consoles&lt;br /&gt;
-Multi-media chipsets for pay-TV&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Think of Security:&lt;/i&gt;&lt;br /&gt;
-What is the threat from side channel analysis to embedded systems?&lt;br /&gt;
-How does it compare with attacks on smart cards?&lt;br /&gt;
-What are the future developments?&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Attacking Side Channels&lt;/i&gt;&lt;br /&gt;
-Time&lt;br /&gt;
-Power consumption&lt;br /&gt;
-Electro-Magnetic radiation&lt;br /&gt;
-Light&lt;br /&gt;
-Sound&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;i&gt;Power/EM traces&lt;/i&gt;&lt;br /&gt;
-Signal leakage from busses, registers, ALUs, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Statistical data detection&lt;/i&gt;&lt;br /&gt;
-Where is data processed in presence of noise?&lt;br /&gt;
-Collect many traces with different data (n &amp;gt; 1000)&lt;br /&gt;
-Assume data values are:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; known (e.g. algorithm input or output)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; uniformly random (typical for crypto)&lt;br /&gt;
-We focus on one bit of one variable in the process&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaLPoWwAqj7J4mtd40N2gBeQABSXfJ3nm3HedSLl4yHAhxNlIkssHlSIuGThaAWxzeSpNRWCR3AYvM35gQgliqqrqnfdFDCAyg8UnQ4AdnCKuSSmp6TPuM1lVHZahn1UQYgvpKWP-6-F8/s1600/14-Aug-26-10-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaLPoWwAqj7J4mtd40N2gBeQABSXfJ3nm3HedSLl4yHAhxNlIkssHlSIuGThaAWxzeSpNRWCR3AYvM35gQgliqqrqnfdFDCAyg8UnQ4AdnCKuSSmp6TPuM1lVHZahn1UQYgvpKWP-6-F8/s320/14-Aug-26-10-pic1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;i&gt;Differential trace&lt;/i&gt;&lt;br /&gt;
-Input: n traces with known variable (e.g. input or output)&lt;br /&gt;
-Output: 1 trace with indication where bit causes trace differences&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Purpose of Side Channel Attacks on Embedded Systems&lt;/i&gt;&lt;br /&gt;
-Retrieve secrets (Key, PIN, Unlock code)&lt;br /&gt;
-Reverse engineer (Program flow, Crypto protocol, Algorithm)&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Why Side Channel Attacks are interesting? If side channel threats depends on:&lt;/i&gt;&lt;br /&gt;
-Physical access?&lt;br /&gt;
-Access time window?&lt;br /&gt;
-Interfacing and control?&lt;br /&gt;
-Exploitation equipment $?&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;A device becomes interesting when:&lt;/i&gt;&lt;br /&gt;
-It contains a secret&lt;br /&gt;
-It contains a feature that can be unlocked&lt;br /&gt;
-Logical or physical access to internals is hard&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Typical Side Channel Attack Example&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5ZnUfIlvc9Ru9zkgy0XojSMe6Nop-C7JYrs4SEIKhG8GA2mX5QBRDyAbWy_0iwfWY5rpUBVXcvp79FVV6U6LR55hqIdnYqOxVOty8ZltNsBqw0HPPIV_BrWu9st7BlVIiWWaFuV6GyT8/s1600/14-Aug-26-10-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5ZnUfIlvc9Ru9zkgy0XojSMe6Nop-C7JYrs4SEIKhG8GA2mX5QBRDyAbWy_0iwfWY5rpUBVXcvp79FVV6U6LR55hqIdnYqOxVOty8ZltNsBqw0HPPIV_BrWu9st7BlVIiWWaFuV6GyT8/s320/14-Aug-26-10-pic2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Typical Prerequisites&lt;/i&gt;&lt;br /&gt;
-Access to side channel&lt;br /&gt;
-Access to input or output data&lt;br /&gt;
-Minimize noise in side channel&lt;br /&gt;
-Time measurement of operation (trigger)&lt;br /&gt;
-Link data to operation&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Processor comparison with Smart Card&lt;/i&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIMRAw0-_IPDf74JPjJAhuYJ70x0JydcMVhnNuioQnZLYQJuSLWUxo-H-ZlNYjlp399e-qAv4eBe1Qie0LmCzNka6NSWo9AJU37vz1orY2FtiQArmR-7okJZ-7ad2LP9-Kf_Oo1ZLG_4A/s1600/14-Aug-26-10-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIMRAw0-_IPDf74JPjJAhuYJ70x0JydcMVhnNuioQnZLYQJuSLWUxo-H-ZlNYjlp399e-qAv4eBe1Qie0LmCzNka6NSWo9AJU37vz1orY2FtiQArmR-7okJZ-7ad2LP9-Kf_Oo1ZLG_4A/s320/14-Aug-26-10-pic3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;i&gt;Acquisition comparison with Smart Card&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyo36g8nlM65won9Z6jIpoSlNEKKqLpn6Dd0aOmh6TL1v-3yrhUXRPUCNTbv3sc_WcG37w2_jKiaGLXbk8DNQ-M8BhLBRIpNiG7MjBnFaATNPUjyyvuVdbR1mj9UWem3jq5J-zgYLQkQQ/s1600/14-Aug-26-10-pic4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyo36g8nlM65won9Z6jIpoSlNEKKqLpn6Dd0aOmh6TL1v-3yrhUXRPUCNTbv3sc_WcG37w2_jKiaGLXbk8DNQ-M8BhLBRIpNiG7MjBnFaATNPUjyyvuVdbR1mj9UWem3jq5J-zgYLQkQQ/s320/14-Aug-26-10-pic4.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;i&gt;Test vs. Attack&lt;/i&gt;&lt;br /&gt;
-An attacker needs to turn a vulnerability into an exploit&lt;br /&gt;
-A tester needs to gain insight in attacker cost efficiently&lt;br /&gt;
-How to create the optimal environment to discover a vulnerability?&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;General aspects of testing&lt;/i&gt;&lt;br /&gt;
-Controlling the crypto&lt;br /&gt;
-Linking data with measurements&lt;br /&gt;
-Efficiency of acquisition&lt;br /&gt;
-Increased speed versus increased complexity&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Timing analysis&lt;/i&gt;&lt;br /&gt;
-Peripheral outputs assist (example XBOX 360)&lt;br /&gt;
-Exploiting runtime access (cache)&lt;br /&gt;
-Increasing accuracy with EM and power&lt;br /&gt;
-Timing is a risk in many software implementations: both crypto and comparisons&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;XBOX 360 with Backdoor&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuGm8TNZN4-ORMxQrO5pC_RgwufoxvEFDOew1Gb3Dgpyv1TGPnOevhpjMHN_0igq4YhLyCsw4JpXUS86FlkW06AsEggApM-GKPJzR-caXpv5doT_cJTDn_ws5O0EbEA8zdMxlnpzpY5qQ/s1600/14-Aug-26-10-pic5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuGm8TNZN4-ORMxQrO5pC_RgwufoxvEFDOew1Gb3Dgpyv1TGPnOevhpjMHN_0igq4YhLyCsw4JpXUS86FlkW06AsEggApM-GKPJzR-caXpv5doT_cJTDn_ws5O0EbEA8zdMxlnpzpY5qQ/s320/14-Aug-26-10-pic5.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;-XBOX 360 has a secure boot chain&lt;br /&gt;
-First boot loader security implemented with a HMAC-SHA1&lt;br /&gt;
-Hash secret key + boot loader with SHA1&lt;br /&gt;
-Compare 16 bytes result with stored 16 bytes&lt;br /&gt;
-Comparison is per byte -&amp;gt; timing attack&lt;br /&gt;
-Implementation in this infectus board:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; It can modify stored HMAC-SHA1 value in NAND flash&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Observes timing of diagnostic POST byte on PCB&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Reset CPU with nTRST&lt;br /&gt;
-Brute forcing 16*128 = 2048 values on average takes about 2 hrs&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Power analysis&lt;/i&gt;&lt;br /&gt;
-Tapping power or supplying it&lt;br /&gt;
-Reaching rails&lt;br /&gt;
-Identifying the correct supply rail&lt;br /&gt;
-Disabling power domains&lt;br /&gt;
-Disabling peripherals&lt;br /&gt;
-All require more detailed knowledge on target&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;EM (Electro Magnetic) Analysis&lt;/i&gt;&lt;br /&gt;
-EM signal adds dimension&lt;br /&gt;
-How to locate?&lt;br /&gt;
-When can EM be better?&lt;br /&gt;
-EMA is an active research topic&lt;br /&gt;
-EM seems to add most when target operation is small relative to overall chip&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Threat and Impact&lt;/i&gt;&lt;br /&gt;
-Few countermeasures&lt;br /&gt;
-Significant leakage&lt;br /&gt;
-Fast acquisition&lt;br /&gt;
-Required level of control&lt;br /&gt;
-Attacks needed to achieve control&lt;br /&gt;
-High noise level, increased acquisition times&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Countermeasures&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Hardware&lt;/i&gt;&lt;br /&gt;
-Random Interrupts&lt;br /&gt;
-Data / Key masking&lt;br /&gt;
-Shielding&lt;br /&gt;
-Balancing&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Software&lt;/i&gt;&lt;br /&gt;
-Randomizing flow&lt;br /&gt;
-Blinding / Masking&lt;br /&gt;
-Algorithm&lt;br /&gt;
-Protocol design</description><link>http://ethicalhackernet.blogspot.com/2010/08/analyzing-side-channel-attacks-on.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaLPoWwAqj7J4mtd40N2gBeQABSXfJ3nm3HedSLl4yHAhxNlIkssHlSIuGThaAWxzeSpNRWCR3AYvM35gQgliqqrqnfdFDCAyg8UnQ4AdnCKuSSmp6TPuM1lVHZahn1UQYgvpKWP-6-F8/s72-c/14-Aug-26-10-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-7446883289591857876</guid><pubDate>Tue, 10 Aug 2010 00:15:00 +0000</pubDate><atom:updated>2011-03-08T18:57:57.756-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">attack voip</category><category domain="http://www.blogger.com/atom/ns#">blue box</category><category domain="http://www.blogger.com/atom/ns#">crack sigtran</category><category domain="http://www.blogger.com/atom/ns#">hack telecom backbones</category><category domain="http://www.blogger.com/atom/ns#">phreaking</category><category domain="http://www.blogger.com/atom/ns#">scan ss7 networks</category><category domain="http://www.blogger.com/atom/ns#">sctp scanning</category><category domain="http://www.blogger.com/atom/ns#">sctp stack fingerprinting</category><category domain="http://www.blogger.com/atom/ns#">sigtran</category><category domain="http://www.blogger.com/atom/ns#">sigtran hacking</category><category domain="http://www.blogger.com/atom/ns#">SIP hack</category><category domain="http://www.blogger.com/atom/ns#">ss7 hacking</category><title>Scanning SS7 Networks and Telecom Backbones</title><description>&lt;b&gt;Historic View&lt;/b&gt;&lt;br /&gt;
-Phreaking is a term for the action of making a telephone system do something that it normally should not allow.&lt;br /&gt;
-Telecommunications security problems started in the 1960’s when the hackers of the time started to discover ways to abuse the telephone company.&lt;br /&gt;
-Discovery and exploration of features of telecommunications systems.&lt;br /&gt;
-Controlling Network Elements (NE) in a way that was not planned by its designers.&lt;br /&gt;
-Abusing weaknesses of protocols, systems and applications in telephone networks.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Fraud Implanted by&lt;/i&gt;&lt;br /&gt;
-Blue Box&lt;br /&gt;
-Internal Fraud&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Reliability&lt;/i&gt;&lt;br /&gt;
-US: 911, Europe: 112&lt;br /&gt;
-How much lost revenue is one minute of downtime?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Today&#39;s View&lt;/b&gt;&lt;br /&gt;
-SIP account hacking, remind the &quot;Calling Cards&quot; fraud?&lt;br /&gt;
-VoIP GW hacking, remind the &quot;PBX hacking&quot;?&lt;br /&gt;
-Signaling hacking directly on SS7 – SIGTRAN level&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;SS7 Attacks Scenarios&lt;/b&gt;&lt;br /&gt;
-Theft of service, interception of calling cards numbers, privacy concerns&lt;br /&gt;
-Introduce harmful packets into the national and global SS7 networks&lt;br /&gt;
-Get control of call processing, get control of accounting reports&lt;br /&gt;
-Obtain credit card numbers, non-listed numbers, etc.&lt;br /&gt;
-Messages can be read, altered, injected or deleted&lt;br /&gt;
-Denial of service, security triplet replay to compromise authentication&lt;br /&gt;
-Annoyance calls, free calls, disruption of emergency services&lt;br /&gt;
-Capture of gateways, rerouting of call traffic&lt;br /&gt;
-Disruption of service to large parts of the network&lt;br /&gt;
-Call processing exposed through Signaling Control Protocol&lt;br /&gt;
-Announcement service exposed to IP through RTP&lt;br /&gt;
-Disclosure of bearer channel traffic&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Telecom Backbone&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilPSoh0-sN7mZYGtfnp8ed9VhUzvTTkJblFjZfWhqcsMCPGLV8OdrAlKpXvQoXc12gZrA3X_Kke3GfKEdOrbm2mXXiKUuu0es-Z-qzoLvVaDeUDw-8Xq4VJcJtL5ppA36VmC1nvGpDRvw/s1600/13-Aug-10-10-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilPSoh0-sN7mZYGtfnp8ed9VhUzvTTkJblFjZfWhqcsMCPGLV8OdrAlKpXvQoXc12gZrA3X_Kke3GfKEdOrbm2mXXiKUuu0es-Z-qzoLvVaDeUDw-8Xq4VJcJtL5ppA36VmC1nvGpDRvw/s320/13-Aug-10-10-pic1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Discovering The Backbone&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Deregulation&lt;/i&gt;&lt;br /&gt;
-Europe / US: CLEC vs ILEC&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;New services and new business partners&lt;/i&gt;&lt;br /&gt;
-Premium numbers, SMS providers, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Push toward an “All IP” infrastructure&lt;/i&gt;&lt;br /&gt;
-Management network&lt;br /&gt;
-Cost&lt;br /&gt;
-SIGTRAN (SS7 over IP)&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;SS7 &amp;amp; SIGTRAN&lt;/i&gt;&lt;br /&gt;
-Core&lt;br /&gt;
-Formerly, the walled garden&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;VoIP&lt;/i&gt;&lt;br /&gt;
-Edge&lt;br /&gt;
-Hard to make it reliable (QoS, SBCs)&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;SS7 and IP&lt;/i&gt;&lt;br /&gt;
-There is also exponential growth in the use of interconnection between the telecommunication networks and the Internet, for example with VoIP protocols (e.g. SIP, SCTP, M3UA, etc.)&lt;br /&gt;
-The IT community now has many protocol converters for conversion of SS7 data to IP, primarily for the transportation of voice and data over the IP networks. In addition new services such&amp;nbsp; as those based on IN will lead to a growing use of the SS7 network for general data transfers.&lt;br /&gt;
-There have been a number of incidents from accidental action on SS7, which have damaged a&amp;nbsp; network. To date, there have been very few deliberate actions. Far from VoIP here.&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Attacking SIGTRAN with SCTPscan (http://sctp.tstf.net/)&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Where implementation diverge from RFCs&lt;/i&gt;&lt;br /&gt;
-RFC says &quot;hosts should never answer to INIT packets on non-existings ports&quot;.&lt;br /&gt;
-Syn scanning is slow when no RST&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Below the IDS&lt;/i&gt;&lt;br /&gt;
-How many firewall logs dropped SCTP packets?&lt;br /&gt;
-How many IDS(s) watch for SCTP socket evil content?&lt;br /&gt;
-Example: Dshield.org - Real life distributed IDS, Hundreds of thousands of IP scanned, nor detected neither reported as scanner.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;INIT vs SHUTDOWN_ACK Packet Scanning&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;From RFC 2960&lt;/i&gt;&lt;br /&gt;
-8.4 Handle &quot;Out of the blue&quot; Packets&lt;br /&gt;
-An SCTP packet is called an &quot;out of the blue&quot; (OOTB) packet if it is correctly formed, i.e., passed the&amp;nbsp; receiver&#39;s Adler-32 / CRC-32 check (see Section 6.8), but the receiver is not able to identify the association to which this packet belongs.&lt;br /&gt;
-The receiver of an OOTB packet MUST do the following:&lt;br /&gt;
&quot;If the packet contains a SHUTDOWN ACK chunk, the receiver should respond to the sender of the OOTB packet with a SHUTDOWN COMPLETE.&quot;&lt;br /&gt;
&lt;br /&gt;
-New way to elicit answers even if not answering ABORTs to INITs targeted at not-opened port.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;SCTP ports (-sS) Stealth Scanning&lt;/b&gt;&lt;br /&gt;
root@bt:~/sctp# ./sctpscan-v11 --scan --autoportscan -r&lt;br /&gt;
203.151.1&lt;br /&gt;
Netscanning with Crc32 checksumed packet&lt;br /&gt;
203.151.1.4 SCTP present on port 2905&lt;br /&gt;
203.151.1.4 SCTP present on port 7102&lt;br /&gt;
203.151.1.4 SCTP present on port 7103&lt;br /&gt;
203.151.1.4 SCTP present on port 7105&lt;br /&gt;
203.151.1.4 SCTP present on port 7551&lt;br /&gt;
203.151.1.4 SCTP present on port 7701&lt;br /&gt;
203.151.1.4 SCTP present on port 7800&lt;br /&gt;
203.151.1.4 SCTP present on port 8001&lt;br /&gt;
203.151.1.4 SCTP present on port 2905&lt;br /&gt;
root@bt:~/sctp#&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;SCTP Stack Fingerprinting&lt;/b&gt;&lt;br /&gt;
-SCTP stack reliability&lt;br /&gt;
-Robustness testing (stress testing)&lt;br /&gt;
-QA of a few stacks&lt;br /&gt;
-Fuzzing built-in SCTPscan&lt;br /&gt;
-Discrepancies in SCTP answer packets&lt;br /&gt;
-Different stack behaviours&lt;br /&gt;
-Much more states than TCP=opportunities&lt;br /&gt;
-Cookie randomness&lt;br /&gt;
&lt;br /&gt;
Credits: Philippe Langlois, P1 Security (&lt;a href=&quot;http://p1security.com/&quot;&gt;p1security.com&lt;/a&gt;)</description><link>http://ethicalhackernet.blogspot.com/2010/08/scanning-ss7-networks-and-telecom.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilPSoh0-sN7mZYGtfnp8ed9VhUzvTTkJblFjZfWhqcsMCPGLV8OdrAlKpXvQoXc12gZrA3X_Kke3GfKEdOrbm2mXXiKUuu0es-Z-qzoLvVaDeUDw-8Xq4VJcJtL5ppA36VmC1nvGpDRvw/s72-c/13-Aug-10-10-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-7857598951446052324</guid><pubDate>Mon, 02 Aug 2010 17:58:00 +0000</pubDate><atom:updated>2010-08-02T13:28:25.764-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">davix</category><category domain="http://www.blogger.com/atom/ns#">information security visualization</category><category domain="http://www.blogger.com/atom/ns#">log visualization</category><category domain="http://www.blogger.com/atom/ns#">scientific visualization</category><category domain="http://www.blogger.com/atom/ns#">visualization effectiveness</category><category domain="http://www.blogger.com/atom/ns#">visualization process</category><title>Using DAVIX For Security Visualization (revised)</title><description>&lt;b&gt;Information visualization&lt;/b&gt;&lt;br /&gt;
-Visualize large collections of abstract data&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Scientific visualization&lt;/b&gt;&lt;br /&gt;
-Representation of data with geometric structure&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQWZiJSuhY9WwpH9wu0oEMJym7ua6PLVdEpissrU8JTMNRrlQCzbnQd1bVPx3riD6T-JnBKfuZNGlNgtYLnNfLXv75Pt2cxHtS7bFkw-u-FTNe7u-iEOpaqdd54MHKgs4lB56UrzXjUz8/s1600/12-Aug-01-10-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQWZiJSuhY9WwpH9wu0oEMJym7ua6PLVdEpissrU8JTMNRrlQCzbnQd1bVPx3riD6T-JnBKfuZNGlNgtYLnNfLXv75Pt2cxHtS7bFkw-u-FTNe7u-iEOpaqdd54MHKgs4lB56UrzXjUz8/s320/12-Aug-01-10-pic1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Visualization Concept&lt;/b&gt;&lt;br /&gt;
-Analyzing floods of data in tabular or textual form is tedious&lt;br /&gt;
-Humans must sequentially scan such data&lt;br /&gt;
-Visualization exploits the human&#39;s visual perceptive capabilities and parallel processing Size, Shape, Distance, and Color&lt;br /&gt;
-Easy to spot patterns and irregularities&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Data types supported&lt;/b&gt;&lt;br /&gt;
-&lt;i&gt;Ordinal&lt;/i&gt;&lt;br /&gt;
Has a sequence e.g. day of week&lt;br /&gt;
-&lt;i&gt;Nominal&lt;/i&gt;&lt;br /&gt;
Has no sequence e.g. types of fishes&lt;br /&gt;
-&lt;i&gt;Quantitative&lt;/i&gt;&lt;br /&gt;
Can be measured e.g. length, time, weight, temperature, speed&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Visualization Effectiveness&lt;/b&gt;&lt;br /&gt;
-Each data type has its most effective way of visualization&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinXwb-jtAS-ST9NOvqXzXwGvD9YHKzi8ZoXwctj2Fc817HIYI5LAjZTtibYSIfBB9p7ilxOv4TrcmMdz6lEXZZ569oIbqB2hzZNo22GNCDtL3-PK72C14xssBox4xTP3RLv9Dr7Zx9stI/s1600/12-Aug-01-10-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinXwb-jtAS-ST9NOvqXzXwGvD9YHKzi8ZoXwctj2Fc817HIYI5LAjZTtibYSIfBB9p7ilxOv4TrcmMdz6lEXZZ569oIbqB2hzZNo22GNCDtL3-PK72C14xssBox4xTP3RLv9Dr7Zx9stI/s320/12-Aug-01-10-pic2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;Information Visualization Process&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEPbXl1KHmSdGvYyKovvj3hNhJtx6UeKOKIMOXRZL2Ru-RQHUhGOwiCD6Yk3CFgugXVEesBljg7g6sbeJihg0BbgST4MstPWWzTywEhP8eQbK-mLHGPlSSRpVjHm6mCv8hUdwe2l2nFw4/s1600/12-Aug-01-10-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEPbXl1KHmSdGvYyKovvj3hNhJtx6UeKOKIMOXRZL2Ru-RQHUhGOwiCD6Yk3CFgugXVEesBljg7g6sbeJihg0BbgST4MstPWWzTywEhP8eQbK-mLHGPlSSRpVjHm6mCv8hUdwe2l2nFw4/s320/12-Aug-01-10-pic3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;DAVIX Linux Distribution&lt;/b&gt; (&lt;a href=&quot;http://davix.secviz.org/&quot;&gt;http://davix.secviz.org/&lt;/a&gt;)&lt;br /&gt;
-Provide the audience with a workable and integrated tools set&lt;br /&gt;
-Enable them to immediately start with security visualization&lt;br /&gt;
-Motivate them to contribute to the security visualization community&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Tools Available&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;Capture&lt;/i&gt;&lt;br /&gt;
-Network Tools (Argus, Snort, Wireshark)&lt;br /&gt;
-Logging (syslog-ng)&lt;br /&gt;
-Fetching Data (wget, ftp, scp)&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Processing&lt;/i&gt;&lt;br /&gt;
-Shell Tools (awk, grep, sed)&lt;br /&gt;
-Visualization Preprocessing (AfterGlow, LGL)&lt;br /&gt;
-Extraction (Chaosreader)&lt;br /&gt;
-Data Enrichment (geoiplookup, whois, gwhois)&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Visualization&lt;/i&gt;&lt;br /&gt;
-Network Traffic (EtherApe, InetVis, tnv)&lt;br /&gt;
-Generic (AfterGlow, Cytoscape, Graphviz, LGL Viewer, Mondrian, R Project, Treemap)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Interface Transport&lt;/b&gt;&lt;br /&gt;
-Each visualization tool has its own file format interfaces&lt;br /&gt;
-Data must be converted to match the import interfaces&lt;br /&gt;
-These adapters are mostly self-written snippets of code&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Important Note:&lt;/b&gt;&lt;br /&gt;
All the images presented in this post are intellectual property of the copyright owner (www.secviz.org)</description><link>http://ethicalhackernet.blogspot.com/2010/08/using-davix-for-security-visualization_02.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQWZiJSuhY9WwpH9wu0oEMJym7ua6PLVdEpissrU8JTMNRrlQCzbnQd1bVPx3riD6T-JnBKfuZNGlNgtYLnNfLXv75Pt2cxHtS7bFkw-u-FTNe7u-iEOpaqdd54MHKgs4lB56UrzXjUz8/s72-c/12-Aug-01-10-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-4516813338675309158</guid><pubDate>Tue, 22 Jun 2010 21:19:00 +0000</pubDate><atom:updated>2010-06-22T16:49:46.869-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">bgp attacks</category><category domain="http://www.blogger.com/atom/ns#">bgp mitm</category><category domain="http://www.blogger.com/atom/ns#">bgp protocol vulnerabilities</category><category domain="http://www.blogger.com/atom/ns#">bgp routing hack</category><category domain="http://www.blogger.com/atom/ns#">hijack youtube traffic</category><category domain="http://www.blogger.com/atom/ns#">pakistan telecom youtube</category><category domain="http://www.blogger.com/atom/ns#">prevent bgp attack</category><category domain="http://www.blogger.com/atom/ns#">youtube bgp hack</category><title>Defending BGP MITM (Man-In-The-Middle) Attacks</title><description>Every organization owes its Internet connectivity to one protocol: BGP4. There are no alternatives. BGP4 has longstanding vulnerabilities that cannot be fixed, and can only be monitored carefully.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Two key points:&lt;/b&gt;&lt;br /&gt;
1. Everyone who connects to the Internet is currently exposed to various routing risks: downtime, hijacking and now even wholesale traffic interception.&lt;br /&gt;
2. Very few people understand these risks, so they are not being measured or managed appropriately.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Basics of routing and the inherent threats:&lt;/b&gt;&lt;br /&gt;
-Prefixes&lt;br /&gt;
-ASNs&lt;br /&gt;
-Routing updates&lt;br /&gt;
-Route attributes&lt;br /&gt;
-Vulnerabilities &amp;amp; typical historical attacks&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Internet Routing – Prefixes&lt;/b&gt;&lt;br /&gt;
-Internet routing is orchestrated via blocks of IP addresses.&lt;br /&gt;
-A network prefix is a block of contiguous IP addresses.&lt;br /&gt;
-IP addresses in the same prefix are routed in the same way.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Internet Routing – ASNs&lt;/b&gt;&lt;br /&gt;
Global Internet routing relies on the Border Gateway Protocol. Each organization participating in BGP is assigned:&lt;br /&gt;
-A unique Autonomous System Number or ASN (integer)&lt;br /&gt;
-One or more prefixes (range of IP addresses)&lt;br /&gt;
-All routing decisions are local&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;BGP Update Messages&lt;/b&gt;&lt;br /&gt;
-An UPDATE message announces a new route or withdraws a previously announced route.  UPDATE = prefix + route attributes&lt;br /&gt;
-Adjacent routers chatter constantly with each other as routes come and go. Globally, Renesys observes 45,000+ updates per minute when things are quiet!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;BGP Attributes&lt;/b&gt;&lt;br /&gt;
Routing announcements have attributes and many possibilities but the (hopefully valid) &quot;AS&quot; path to the announced prefix is always present.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Routing Vulnerabilities&lt;/b&gt;&lt;br /&gt;
1. No single authoritative source of who should be doing what.&lt;br /&gt;
-If there were, you could filter out the errors / hijacks.&lt;br /&gt;
-As a result, filtering by ISPs is not common or easy.&lt;br /&gt;
&lt;br /&gt;
2. All of Internet routing is based on trust.&lt;br /&gt;
-Anyone can announce any IP space they want.&lt;br /&gt;
-Anyone can prepend any ASN to any path that they want.&lt;br /&gt;
&lt;br /&gt;
3. No mechanism in place to handle ASNs who go rogue. There are no Internet police!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Two typical types of hijacks:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;No operational impact&lt;/i&gt;&lt;br /&gt;
-Hijack unused (but maybe assigned) IP space&lt;br /&gt;
-Potentially harms the reputation of the owner&lt;br /&gt;
-But does not disrupt any legitimate traffic on the Internet&lt;br /&gt;
-DoD owns but does not announce 7.0.0.0/8, 11.0.0.0/8, 30.0.0.0/8 and others. These networks &lt;br /&gt;
are “free for the taking” without any impact on DoD. Every announcement in this space is a hijack.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiokAtKl04rIgBUhyphenhyphenPYKzspu7JIkgoG51sKMa6qkuUG9cB_7A1ySPNWqlnmsSFB0tuzcZP1InlI6QrPsMvTadjqBOA5TfZbx7Uc0NmG5b4jf9_-SCKCCrDcQ1MPTB52nOzNnNCoctYVvtM/s1600/11-Jun-23-10-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiokAtKl04rIgBUhyphenhyphenPYKzspu7JIkgoG51sKMa6qkuUG9cB_7A1ySPNWqlnmsSFB0tuzcZP1InlI6QrPsMvTadjqBOA5TfZbx7Uc0NmG5b4jf9_-SCKCCrDcQ1MPTB52nOzNnNCoctYVvtM/s320/11-Jun-23-10-pic1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;i&gt;Obvious operational impact&lt;/i&gt;&lt;br /&gt;
-Hijack currently used IP space&lt;br /&gt;
-Legitimate traffic diverted to the hijacker&lt;br /&gt;
-Victim can be effectively taken off the Internet&lt;br /&gt;
-Very disruptive and very obvious&lt;br /&gt;
-YouTube owns 208.65.152.0/22 (Feb 2008)&lt;br /&gt;
This contains the more-specific 208.65.153.0/24&lt;br /&gt;
The above /24 used to contain all of YouTube’s&lt;br /&gt;
DNS Servers (have since moved)&lt;br /&gt;
Web Servers (have since added additional IP space)&lt;br /&gt;
YouTube announced only the /22&lt;br /&gt;
-Pakistan Telecom announces the /24&lt;br /&gt;
In BGP, most specific route to an IP address wins!&lt;br /&gt;
Pakistan Telecom gets all traffic intended for YouTube&lt;br /&gt;
YouTube is globally unreachable for 2 hours&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtJ7owWtIBvc_TxwYj1Gc0b4hQEo_1UnO5zMYKe70GqoTrNNu8l99qTGhUuh9Ch7sYPuckku_R4PUt2rHCXcMpKgbKtWYe_Q6i2f8_XMFQdf4Y6Tgqt3yNUuZhny3_AAAyB68jHpCXMng/s1600/11-Jun-23-10-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtJ7owWtIBvc_TxwYj1Gc0b4hQEo_1UnO5zMYKe70GqoTrNNu8l99qTGhUuh9Ch7sYPuckku_R4PUt2rHCXcMpKgbKtWYe_Q6i2f8_XMFQdf4Y6Tgqt3yNUuZhny3_AAAyB68jHpCXMng/s320/11-Jun-23-10-pic2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Both types of hijack allow an attacker to attract all traffic bound for the hijacked space.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Final Evaluation&lt;/b&gt;&lt;br /&gt;
-Hijacking has been going on for over 10 years!&lt;br /&gt;
-No incremental or comprehensive solutions&lt;br /&gt;
-Solutions lack economic drivers&lt;br /&gt;
-Doesn’t happen daily and universally&lt;br /&gt;
-Avoiding negative publicity is not necessarily compelling&lt;br /&gt;
-Impact poorly understood by management&lt;br /&gt;
-Miscreants are actively hijacking now&lt;br /&gt;
-To send spam from “clean” IP blocks&lt;br /&gt;
-To cover their other nefarious activities&lt;br /&gt;
-What good are your firewall/IDS logs now?&lt;br /&gt;
-Need historical global routing data to identify hijackers&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Man-In-The-Middle Attack&lt;/b&gt;&lt;br /&gt;
-Review the MITM exploit presented at DEFCON 16 (August 10, 2008)&lt;br /&gt;
-AS path attribute&lt;br /&gt;
-AS loop prevention&lt;br /&gt;
-MITM attack technique&lt;br /&gt;
-Obscuring the MITM attack with TTL adjustment&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW8HKUkEdvlqnWA2l8sseiKJr3uSicj_hDL9wrfFP-Cvz7KEUP1FiwiL7PvsiHTrzJhv1wMsM1S4tJ0NG6nih_dv3IzfnzGQ0rclF5VB_ngv7mgK2CDh0sxocqKr2ePzjUtfWuZm-OrQA/s1600/11-Jun-23-10-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW8HKUkEdvlqnWA2l8sseiKJr3uSicj_hDL9wrfFP-Cvz7KEUP1FiwiL7PvsiHTrzJhv1wMsM1S4tJ0NG6nih_dv3IzfnzGQ0rclF5VB_ngv7mgK2CDh0sxocqKr2ePzjUtfWuZm-OrQA/s320/11-Jun-23-10-pic3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How can the victim observe this?&lt;/b&gt;&lt;br /&gt;
-Victim’s routes and those of at least one provider will look normal&lt;br /&gt;
-Traceroute from a public looking glass to the victim’s IPs will show the hijacker &lt;br /&gt;
(assuming the looking glass hasn’t been blinded to the attack).&lt;br /&gt;
-Traceroute depends on incrementally increasing TTLs&lt;br /&gt;
-Hijacker can hide his presence by silently increasing TTLs for packets intended for the victim&lt;br /&gt;
-Hides hijacker’s routers&lt;br /&gt;
-Hides hijacker’s outbound routes to victim&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Detecting the Attack&lt;/b&gt;&lt;br /&gt;
-Is this generally visible?&lt;br /&gt;
-Attacker profile&lt;br /&gt;
-Difficulties with detection&lt;br /&gt;
-You know the correct routing policies (easy)&lt;br /&gt;
-Generally limited to networks under your control&lt;br /&gt;
-Review of available alarm services&lt;br /&gt;
-Can you attack the alarm services?&lt;br /&gt;
-You don’t know the routing policies (hard)&lt;br /&gt;
-A proposed global detection technique&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Difficulties in observing the MITM attack&lt;/b&gt;&lt;br /&gt;
-Most Internet routers will see and prefer the hijacked routes. Won’t be obvious among their&lt;br /&gt;
270,000+ routes.&lt;br /&gt;
-Traceroutes won’t show the hijacking (with TTL adjustments). Independent of source location.&lt;br /&gt;
-Latency to the victim will increase. Could be slight if the hijacker isn’t far from the victim.&lt;br /&gt;
-Route alarming services might see this if AS loop detection is disabled.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Two simple questions:&lt;/b&gt;&lt;br /&gt;
Can I detect MITM for my network?&lt;br /&gt;
-Easy: Routing policy is presumably known or at least knowable.&lt;br /&gt;
&lt;br /&gt;
Can I detect MITM for the Internet at large?&lt;br /&gt;
-Much harder: Routing policies are not known and probably unknowable for all 270,000+ prefixes</description><link>http://ethicalhackernet.blogspot.com/2010/06/defending-bgp-mitm-man-in-middle.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiokAtKl04rIgBUhyphenhyphenPYKzspu7JIkgoG51sKMa6qkuUG9cB_7A1ySPNWqlnmsSFB0tuzcZP1InlI6QrPsMvTadjqBOA5TfZbx7Uc0NmG5b4jf9_-SCKCCrDcQ1MPTB52nOzNnNCoctYVvtM/s72-c/11-Jun-23-10-pic1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-507651743905766369</guid><pubDate>Mon, 31 May 2010 22:25:00 +0000</pubDate><atom:updated>2010-05-31T17:55:26.726-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">hack moss</category><category domain="http://www.blogger.com/atom/ns#">hack sharepoint</category><category domain="http://www.blogger.com/atom/ns#">hack wss</category><category domain="http://www.blogger.com/atom/ns#">SharePoint Google</category><category domain="http://www.blogger.com/atom/ns#">SharePoint ISAPI Registry</category><category domain="http://www.blogger.com/atom/ns#">SharePoint Nmap</category><category domain="http://www.blogger.com/atom/ns#">SharePoint Regex</category><title>Breaking Into SharePoint Portal</title><description>&lt;b&gt;Windows SharePoint Services (WSS)&lt;/b&gt;&lt;br /&gt;
- Base technology&lt;br /&gt;
- Free (with Windows Server)&lt;br /&gt;
- Consists of an ASP.NET web site and ISAPI filter&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Microsoft Office SharePoint Server (MOSS)&lt;/b&gt;&lt;br /&gt;
- Built on top of WSS&lt;br /&gt;
- Not free&lt;br /&gt;
- Supports collaboration on MS Office documents&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Security Aware?&lt;/b&gt;&lt;br /&gt;
- Gartner predicts SharePoint will replace network file shares&lt;br /&gt;
- Default security model: all site users have read access to all documents&lt;br /&gt;
- Big target – single repository for sensitive corporate data – salaries, phone numbers, customer lists,&amp;nbsp; passwords, strategic plans, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hacking the SharePoint ISAPI Registry&lt;/b&gt;&lt;br /&gt;
A potential EoP, but not interesting:&lt;br /&gt;
- Requires Terminal Services to be enabled with “NT4 compat mode”&lt;br /&gt;
- In that scenario, several Windows components have the same bug&lt;br /&gt;
- See “Web Server Extensions”, referenced in HKLM&lt;br /&gt;
- Check out usage of “Terminal Server User” SID throughout Windows&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hacking SharePoint with Google&lt;/b&gt;&lt;br /&gt;
- Thousands of public, internet-facing SharePoint sites have been created&lt;br /&gt;
- Use Google to identify configuration mistakes&lt;br /&gt;
- More info: http://tinyurl.com/4dccn9&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hacking SharePoint with NMap&lt;/b&gt;&lt;br /&gt;
- SharePoint servers have a distinctive network port signature&lt;br /&gt;
- Depends on firewall config, of course&lt;br /&gt;
- More info: http://tinyurl.com/3oykwp&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hacking SharePoint with RegEx&lt;/b&gt;&lt;br /&gt;
SharePoint RegEx Search&lt;br /&gt;
- http://www.codeplex.com/MossRegExSearch&lt;br /&gt;
- See blog post – http://tinyurl.com/4s49p3&lt;br /&gt;
- Avoid limitations of built-in SharePoint search (i.e., SQL ‘LIKE’ and ‘CONTAINS’ keywords)&lt;br /&gt;
- Instead, harness the power of regular expressions!&lt;br /&gt;
- Search for: strong passwords, credit card info, phone numbers, SSNs, etc.</description><link>http://ethicalhackernet.blogspot.com/2010/05/breaking-into-sharepoint-portal.html</link><author>noreply@blogger.com (S. Ali)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-8500859014204016806</guid><pubDate>Fri, 30 Apr 2010 06:57:00 +0000</pubDate><atom:updated>2010-04-30T02:33:17.232-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">defeat os detection</category><category domain="http://www.blogger.com/atom/ns#">defeat os fingerprinting</category><category domain="http://www.blogger.com/atom/ns#">Ettercap</category><category domain="http://www.blogger.com/atom/ns#">ICMP replies</category><category domain="http://www.blogger.com/atom/ns#">IpMorph</category><category domain="http://www.blogger.com/atom/ns#">ISN profile</category><category domain="http://www.blogger.com/atom/ns#">nmap</category><category domain="http://www.blogger.com/atom/ns#">p0f</category><category domain="http://www.blogger.com/atom/ns#">Ring2</category><category domain="http://www.blogger.com/atom/ns#">SinFP</category><category domain="http://www.blogger.com/atom/ns#">TCP headers</category><category domain="http://www.blogger.com/atom/ns#">timeouts</category><category domain="http://www.blogger.com/atom/ns#">Xprobe2</category><title>Defeating OS Fingerprinting Using IpMorph</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;IpMorph is an Open Source project used to disguise OS-detection process performed using various techniques, such as, banner grabbing, ICMP replies, ISN profile, TCP headers, timeouts and other similar trends. These techniques are usually available in number of tools like Nmap, Xprobe2, SinFP, Ring2, p0f, Ettercap, etc.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdO8u20RBgLVjrSzq_ZGAaLtt59sgRai5IdM5fd6GJb5hxXkw33j5ZrHynl9r8SURjdTVDBGTzDKxEuo3WchyphenhyphenIcs5b_SgcGDAO9pq8MipxWzG5Q3JdPDbqFDXytBzRDY-j_cdAXh2FgAw/s1600/09-Apr-30-10-pic1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdO8u20RBgLVjrSzq_ZGAaLtt59sgRai5IdM5fd6GJb5hxXkw33j5ZrHynl9r8SURjdTVDBGTzDKxEuo3WchyphenhyphenIcs5b_SgcGDAO9pq8MipxWzG5Q3JdPDbqFDXytBzRDY-j_cdAXh2FgAw/s320/09-Apr-30-10-pic1.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Active Stack Fingerprinting&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8Mz32Zn_pL0MfkCoA3HbVJBWztTmg9ifRbgD6rjuLTV-IgR-OGfzTt71NmKoBhiOGl0fc9mu2ckdNXVgc8NahocykYSAUiojOLNoUMvzlCWmIgG9hAUMJ-rCHWdvcg7eQFhnHbbNUrzs/s1600/09-Apr-30-10-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8Mz32Zn_pL0MfkCoA3HbVJBWztTmg9ifRbgD6rjuLTV-IgR-OGfzTt71NmKoBhiOGl0fc9mu2ckdNXVgc8NahocykYSAUiojOLNoUMvzlCWmIgG9hAUMJ-rCHWdvcg7eQFhnHbbNUrzs/s320/09-Apr-30-10-pic2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Passive Stack Fingerprinting&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgejPXOrZaDGU3UBDyEelfJvuwWBjw_dPVBBRnOeXC7WxXTfCFSgpbwXu-ckyXS04YPLRF7AXjjEaUQrcFb3f6pdAJnNPorftKnchjdMUntKwIAT9IQzhOK_6V9QyeBczsWTx3O6gIuIRg/s1600/09-Apr-30-10-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgejPXOrZaDGU3UBDyEelfJvuwWBjw_dPVBBRnOeXC7WxXTfCFSgpbwXu-ckyXS04YPLRF7AXjjEaUQrcFb3f6pdAJnNPorftKnchjdMUntKwIAT9IQzhOK_6V9QyeBczsWTx3O6gIuIRg/s320/09-Apr-30-10-pic3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;How IpMorph Works&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtQKtWGJXbHQcS32YEwDRl8DF8K94xQt7jr8eGzlX2UPgXaxkEQl8KKMjHgb8hV1_GpdyjceH_WNuHH6dp45EntABU2b0H4RuBavi6Jm51l9BSGxv-sEv_d-cshOTRmujDdfcRp8lhYcw/s1600/09-Apr-30-10-pic4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtQKtWGJXbHQcS32YEwDRl8DF8K94xQt7jr8eGzlX2UPgXaxkEQl8KKMjHgb8hV1_GpdyjceH_WNuHH6dp45EntABU2b0H4RuBavi6Jm51l9BSGxv-sEv_d-cshOTRmujDdfcRp8lhYcw/s320/09-Apr-30-10-pic4.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Spoofing States&lt;/b&gt;&lt;/div&gt;&lt;i&gt;Filtering&lt;/i&gt;&lt;br /&gt;
– Stealth patch : Unmaintained as of 2002, GNU/Linux kernel 2.2-2.4&lt;br /&gt;
– Blackhole : FreeBSD, kernel options&lt;br /&gt;
– IPlog : Unmaintained as of 2001, *BSD&lt;br /&gt;
– Packet filter : OpenBSD&lt;br /&gt;
&lt;i&gt;Host TCP/IP stack tweaking&lt;/i&gt;&lt;br /&gt;
– Ip Personality&lt;br /&gt;
– Fingerprint opt&lt;br /&gt;
– Fingerprint scrubber&lt;br /&gt;
– OSfuscate&lt;br /&gt;
&lt;i&gt;Host TCP/IP stack replacement (proxy behaviour)&lt;/i&gt;&lt;br /&gt;
– Honeyd&lt;br /&gt;
– Packet purgatory / Morph&lt;br /&gt;
&lt;i&gt;Integrated Tools&lt;/i&gt;&lt;br /&gt;
–IpMorph (Core)&lt;br /&gt;
–IpMorph Controller&lt;br /&gt;
–IpMorph Personality Manager&lt;br /&gt;
–IpView (IpMorph GUI)&lt;br /&gt;
&lt;i&gt;Portability&lt;/i&gt;&lt;br /&gt;
–GNU/Linux&lt;br /&gt;
–BSD, Mac OS&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;IpMorph General Architecture&lt;/b&gt;&lt;br /&gt;
&lt;span id=&quot;goog_735309997&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_735309998&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkxc4qyS0fqxqZXfFbBtp7RW7f8Xfy07I5ijelxosIKagdASr1vi2M95JN9PigUaoCIND0TA6R92mg7HaQN6sLSGlZla5zmKP5VubcXsQoZ3y6s2ceyLnQpFoc-U3raTSjB8i3CSFmSnE/s1600/09-Apr-30-10-pic5.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkxc4qyS0fqxqZXfFbBtp7RW7f8Xfy07I5ijelxosIKagdASr1vi2M95JN9PigUaoCIND0TA6R92mg7HaQN6sLSGlZla5zmKP5VubcXsQoZ3y6s2ceyLnQpFoc-U3raTSjB8i3CSFmSnE/s320/09-Apr-30-10-pic5.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://ethicalhackernet.blogspot.com/2010/04/defeating-os-fingerprinting-using.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdO8u20RBgLVjrSzq_ZGAaLtt59sgRai5IdM5fd6GJb5hxXkw33j5ZrHynl9r8SURjdTVDBGTzDKxEuo3WchyphenhyphenIcs5b_SgcGDAO9pq8MipxWzG5Q3JdPDbqFDXytBzRDY-j_cdAXh2FgAw/s72-c/09-Apr-30-10-pic1.JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-3209716150144730102</guid><pubDate>Sun, 18 Apr 2010 22:02:00 +0000</pubDate><atom:updated>2010-04-18T17:32:39.798-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">adware</category><category domain="http://www.blogger.com/atom/ns#">Botnets</category><category domain="http://www.blogger.com/atom/ns#">downloaders</category><category domain="http://www.blogger.com/atom/ns#">malware affiliate</category><category domain="http://www.blogger.com/atom/ns#">malware detection vs decision</category><category domain="http://www.blogger.com/atom/ns#">malware distribution channel</category><category domain="http://www.blogger.com/atom/ns#">malware legal issues</category><category domain="http://www.blogger.com/atom/ns#">malware threats</category><category domain="http://www.blogger.com/atom/ns#">rogue av</category><category domain="http://www.blogger.com/atom/ns#">spyware</category><category domain="http://www.blogger.com/atom/ns#">trojan</category><title>Insights of the CyberCrime World</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Malware Trends&lt;/b&gt;&lt;br /&gt;
-High complexity of technology introduces higher number of fault (Hardware, Software)&lt;br /&gt;
-Proof of Concept, Exploit Codes, Vulnerabilities (Finding exploits in order to misuse them, making money!)&lt;br /&gt;
-Today&#39;s Malware (Organized in botnets, uses human vulnerabilities)&lt;br /&gt;
-Botnets (Money making operation by selling stolen credentials, renting out botnet services like DDoS, Adware installations, etc)&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Anti-Malware Solutions&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;The decision about the detection of malware (adware, spyware, trojan, etc) can be troublesome. It can be difficult to give a reason why any software is malicious, unwanted or not useful. However, implementing detection mechanism can be rather easy but there is an exception to this rule. Additionally, there is always a need for the cooperation between AV companies to avoid ambiguous decisions. This can be established by introducing standards and best practices such as AVPD, ASC, AMTSO, etc.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Detection vs Decision in Terms of Malware&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3SP-80Bjbz-GZyKLGQNvjSVyXUerz3kdEsYd7knm8SMf3r7j8R3VUB9PTbPR6eOIZhKv9YNI67BOkSUTktUPHuE-C7IIXC9_-UxGuTOz4P7wYQmk9YFPoV35kzVgcl7Bcoi8bGhmaAZE/s1600/08-Apr-19-10-pic1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3SP-80Bjbz-GZyKLGQNvjSVyXUerz3kdEsYd7knm8SMf3r7j8R3VUB9PTbPR6eOIZhKv9YNI67BOkSUTktUPHuE-C7IIXC9_-UxGuTOz4P7wYQmk9YFPoV35kzVgcl7Bcoi8bGhmaAZE/s320/08-Apr-19-10-pic1.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Malware Distribution Channels&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb4bVZNDDoAuvU9jbblfm4MDrucb7oOiIA_yw2R448mrujtW_5WJNgCfI3Wkomt8aKP1Ukyj0pYhq2pKBKTqyPoHTxEd0ou8awqfm8zUzVilbvRfRgYZ497OZIPrOwIL5xBO8CZ4QKt0Q/s1600/08-Apr-19-10-pic2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb4bVZNDDoAuvU9jbblfm4MDrucb7oOiIA_yw2R448mrujtW_5WJNgCfI3Wkomt8aKP1Ukyj0pYhq2pKBKTqyPoHTxEd0ou8awqfm8zUzVilbvRfRgYZ497OZIPrOwIL5xBO8CZ4QKt0Q/s320/08-Apr-19-10-pic2.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Trojan or Normal Application?&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;Trojan&lt;/i&gt;&lt;br /&gt;
-Uncompromising infection&lt;br /&gt;
-Make use of exploits&lt;br /&gt;
-Unattended, unsolicited installation&lt;br /&gt;
-Perform stealth activities&lt;br /&gt;
-Invasiveness&lt;br /&gt;
-Impact on system stability, security and integrity&lt;br /&gt;
-Obfuscated data&lt;br /&gt;
-Detection evasion mechanism&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Normal Application&lt;/i&gt;&lt;br /&gt;
-The application itself isn&#39;t causing any harm&lt;br /&gt;
-EULA, the installation take place with user&#39;s consent&lt;br /&gt;
-The vendors disclaim involvement with the distribution channels&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Vendors doesn&#39;t want their application to be detected&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf-Rgi_P8VYIcEdZMCKkDhxHuRVVbnS-GopAusfbJjpk_TG_ny-TPHAWtMf-8iF3NyGvcD5JEygHiOsdFWlRL9HcoCYWl-OOtf4gAEVcwZ_YRltGFZL06iRMDQMEIg_8rrksNuc2GR4rs/s1600/08-Apr-19-10-pic3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf-Rgi_P8VYIcEdZMCKkDhxHuRVVbnS-GopAusfbJjpk_TG_ny-TPHAWtMf-8iF3NyGvcD5JEygHiOsdFWlRL9HcoCYWl-OOtf4gAEVcwZ_YRltGFZL06iRMDQMEIg_8rrksNuc2GR4rs/s320/08-Apr-19-10-pic3.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Final Outlook of the Malware&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix8gPAdtuz8VgrY9UWlIpHukMuXBw8qe4ji_QD_urUFIUGKS8QP-cAqxmO74tPJAEKdUofHSXhjPcrc34rOIXYj8Ifrklk8hVVnGnW1bdC-REzVryVP3vtoCZ_Y64YpXljH_OfdzPc1EY/s1600/08-Apr-19-10-pic4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix8gPAdtuz8VgrY9UWlIpHukMuXBw8qe4ji_QD_urUFIUGKS8QP-cAqxmO74tPJAEKdUofHSXhjPcrc34rOIXYj8Ifrklk8hVVnGnW1bdC-REzVryVP3vtoCZ_Y64YpXljH_OfdzPc1EY/s320/08-Apr-19-10-pic4.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Legal and Problematic Issues&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;-Applications developed by well-established companies roll out with different affiliate distribution&lt;br /&gt;
model. Now, typically with botnet era?&lt;br /&gt;
-Mutual customers: those who want to use software and be protected at the same time.&lt;br /&gt;
-Other customers: those who never agree to install anything without their trustful consent.&lt;br /&gt;
-Uncontrolled open affiliate distribution model is unfeasible.&lt;br /&gt;
-Direct sponsorship for cybercrime activities.&lt;br /&gt;
-Once detected, these criminal groups are ready to fight even for the price of lawsuit.&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Over the Past 4-years (according to Eset AV Press)&lt;/b&gt;&lt;br /&gt;
-20+ cases where the legal department has been involved&lt;br /&gt;
-Over 1150 hours and 530 employee interactions&lt;br /&gt;
-2006: 16 hours/month, 6 total interactions&lt;br /&gt;
-2009: 46 hours/month, 21 total interactions&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://ethicalhackernet.blogspot.com/2010/04/insights-of-cybercrime-world.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3SP-80Bjbz-GZyKLGQNvjSVyXUerz3kdEsYd7knm8SMf3r7j8R3VUB9PTbPR6eOIZhKv9YNI67BOkSUTktUPHuE-C7IIXC9_-UxGuTOz4P7wYQmk9YFPoV35kzVgcl7Bcoi8bGhmaAZE/s72-c/08-Apr-19-10-pic1.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4484015730406869163.post-192624486116014057</guid><pubDate>Thu, 01 Apr 2010 06:27:00 +0000</pubDate><atom:updated>2010-04-01T01:58:23.532-04:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cwsandbox</category><category domain="http://www.blogger.com/atom/ns#">dynamic analysis</category><category domain="http://www.blogger.com/atom/ns#">malicious documents</category><category domain="http://www.blogger.com/atom/ns#">malware static analysis</category><category domain="http://www.blogger.com/atom/ns#">officecat</category><category domain="http://www.blogger.com/atom/ns#">officemalscanner</category><category domain="http://www.blogger.com/atom/ns#">pdf scanner</category><category domain="http://www.blogger.com/atom/ns#">shellcode detection</category><category domain="http://www.blogger.com/atom/ns#">sparse</category><category domain="http://www.blogger.com/atom/ns#">static analysis</category><category domain="http://www.blogger.com/atom/ns#">vb macros</category><category domain="http://www.blogger.com/atom/ns#">wepawet</category><title>Dissecting Malicious Office Documents</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;In the past, malware was only appearing as an executable file but this threat has changed its landscape to skew through the application data files which includes, pdf, doc, xls, etc. In order to combat this threat, MalOffice has introduced a combination of both &quot;static&quot; and &quot;dynamic&quot; analysis techniques to inspect the application data files. The static analysis uses general and filetype-dependable scanning while the dynamic analysis uses the approach of CWSandbox and other test analysis techniques.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Static Analyzers&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;General:&lt;/i&gt;&lt;br /&gt;
-AV Scanner&lt;br /&gt;
-PE-Detector&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;i&gt;Specialized:&lt;/i&gt;&lt;br /&gt;
-Detect embedded javascript in PDF document&lt;br /&gt;
-Heuristics for malicious javascript&lt;br /&gt;
-Detect shellcode in Office documents&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;PDFScanner&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
Specialized scanner for PDF files&lt;br /&gt;
-Decompose PDF stream into objects (pdftoolkit)&lt;br /&gt;
-Detect javascript objects&lt;br /&gt;
-Use heuristics to detect malicious javascript&lt;br /&gt;
-Extract Variable names&lt;br /&gt;
-Find code obfuscation&lt;br /&gt;
-Usage of known vulnerable functions&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;OfficeMalScanner&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
Specialized scanner for MS Word files&lt;br /&gt;
-Uses OfficeMalScanner, by Frank Boldewin (http://www.reconstructer.org)&lt;br /&gt;
-Forensic tool for Office documents&lt;br /&gt;
-Scans for shellcode pattern&lt;br /&gt;
-Dumps OLE structures and VB-macros&lt;br /&gt;
-Generates a malicious index value&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZKcvLhD00XNk7-K1HdFDApZUYUjFBJnDaPzWIdvyu75W8YJTDl6zfajadiQh-IgORiO8yW8W6Ssa5UC4tDFrbF3JFwK477x520T5K5j5piDkbB9IcxCGceRPoCfS6upxcZlAWyeDmpQU/s1600/07-Mar-31-10-pic1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZKcvLhD00XNk7-K1HdFDApZUYUjFBJnDaPzWIdvyu75W8YJTDl6zfajadiQh-IgORiO8yW8W6Ssa5UC4tDFrbF3JFwK477x520T5K5j5piDkbB9IcxCGceRPoCfS6upxcZlAWyeDmpQU/s320/07-Mar-31-10-pic1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Limitations&lt;/b&gt;&lt;br /&gt;
Static analyis can be circumvented by attacker&lt;br /&gt;
-different kinds of obfuscation are possible&lt;br /&gt;
-general drawbacks of static malware analysis&lt;br /&gt;
-exploit might trigger only on certain events&lt;br /&gt;
-Exploit might require specific version&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Dynamic Analyzers&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;CWSandbox&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
-Tool for automated behavior analysis&lt;br /&gt;
-PE-executables or arbitrary data files&lt;br /&gt;
-Creates XML analysis report: operations executed by the monitored processes&lt;br /&gt;
-Filesystem, registry, network, user management,services, protected storage, etc&lt;br /&gt;
-Each file type has associated host application e.g. Acrobat Reader, Foxit Reader, MS Word, etc&lt;br /&gt;
-Some exploits only trigger in specific app versions e.g. Acrobat Reader 8.0, 8.1.0, 8.1.1, 9.0&lt;br /&gt;
-Task: decide from analysis report, if executed data file is malicious based on &quot;Policies&quot;&lt;br /&gt;
-consist of white and blacklisted operations&lt;br /&gt;
-created in a semi-automated way&lt;br /&gt;
-One policy per host application version&lt;br /&gt;
-What operations are usually perfomed when running this application with a (benign) data file?&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;Static Analysis Result (suspicious points)&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioVSX7fcYTVYPBDFRV_9GP8I1LFQce18Qaz0Odd6tGHa8CMNZo1pV6PqJB7mN9xqeH_PdrtbjMt5lcgz33kaxujSiYZEimpTR1g_q1KmhS46AxfYzom1dMOhtAhsw_FTZ_5R3PaSkn6kU/s1600/07-Mar-31-10-pic2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioVSX7fcYTVYPBDFRV_9GP8I1LFQce18Qaz0Odd6tGHa8CMNZo1pV6PqJB7mN9xqeH_PdrtbjMt5lcgz33kaxujSiYZEimpTR1g_q1KmhS46AxfYzom1dMOhtAhsw_FTZ_5R3PaSkn6kU/s320/07-Mar-31-10-pic2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;Dynamic Analysis Result (malicious points)&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEl8l8J-pj5DrKwdjrxXtNbq_qf7lL8z08cxfEweyLGOt4YIXQ5i_tWzXcIXHn_lh-M5RF_dM0fzoYCkj8lsYKShLKT3Kego5P16uFF3BlXXCVYL0gEeGVt-I56ss8PXOBIEd7N7QJ3UM/s1600/07-Mar-31-10-pic3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEl8l8J-pj5DrKwdjrxXtNbq_qf7lL8z08cxfEweyLGOt4YIXQ5i_tWzXcIXHn_lh-M5RF_dM0fzoYCkj8lsYKShLKT3Kego5P16uFF3BlXXCVYL0gEeGVt-I56ss8PXOBIEd7N7QJ3UM/s320/07-Mar-31-10-pic3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Other Tools&lt;/b&gt;&lt;br /&gt;
SPARSE - focus only on Word documents&lt;br /&gt;
OfficeCat - static scanner for office documents&lt;br /&gt;
OfficeMalScanner - MS office forensic tool&lt;br /&gt;
Wepawet - powerful tool to analyze PDF and Flash files&lt;i&gt;&lt;/i&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/div&gt;</description><link>http://ethicalhackernet.blogspot.com/2010/04/disecting-malicious-office-documents.html</link><author>noreply@blogger.com (S. Ali)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZKcvLhD00XNk7-K1HdFDApZUYUjFBJnDaPzWIdvyu75W8YJTDl6zfajadiQh-IgORiO8yW8W6Ssa5UC4tDFrbF3JFwK477x520T5K5j5piDkbB9IcxCGceRPoCfS6upxcZlAWyeDmpQU/s72-c/07-Mar-31-10-pic1.jpg" height="72" width="72"/></item></channel></rss>