31 killed as wedding party truck falls into drain from bridge in Gujarat

first_imgThirty one persons belonging to a marriage party were killed when a truck fell into a pit on Bhavnagar Rajkot highway in Gujarat on Tuesday. The accident occurred when the truck driver lost control while trying to overtake another vehicle on a narrow bridge. .A total of 60 persons belonging to Anida village were travelling in the truck for the wedding at the bride’s home in Totam village in Botad district. Among those killed include the groom’s parents and relatives.PM expresses griefPrime Minister Narendra Modi expressed grief over the incident, while Gujarat Chief Minister Vijay Rupani ordered an inquiry and announced an ex gratia of Rs four lakh to the kin of each deceased.”My condolences to all those who lost their loved ones due to an accident near Ranghola in Gujarat. The accident was extremely unfortunate and anguishing. May those who have been injured recover at the earliest,” the PMO said in a tweet.“It is a tragic incident. The government is with the victims,” said junior Home Minister Pradipsinh Jadeja in the State Assembly. He added that people were on their way to attend a wedding ceremony in Botad district when the vehicle fell from the bridge on the Bhavnagar-Rajkot highway while overtaking a vehicle.Minister’s statement”The truck fell on a concrete base under the bridge in which 26 persons died on the spot while five others died during treatment,” Mr Jadeja said while making a statement on the incident in the Assembly.Injured persons were receiving treatment in Bhavnagar hospital.last_img read more

Read More →

10 months agoCrystal Palace boss Hodgson: I’d welcome new striker

first_imgCrystal Palace boss Hodgson: I’d welcome new strikerby Paul Vegas10 months agoSend to a friendShare the loveCrystal Palace boss Roy Hodgson has opened the door to signing a new striker in January.Hodgson was asked about his market plans after victory over Wolves.He said, “We’ve got a man coming back we hope. Benteke trains with us tomorrow and obviously he’ll be fully back with us in the course of the next week. If he gets match fit then that will be to an extent a new signing this year because we’ve hardly seen him.“If there are other players that the club can bring in, I certainly won’t be averse to that because we have a very small squad and we haven’t had a lot to back us up at the minute. We’re on the lookout of course and the chairman and technical director are anxious to do what they can to give me and my coaching staff more support, but it’s not easy certainly when you have limited transfer resources.” TagsTransfersAbout the authorPaul VegasShare the loveHave your saylast_img read more

Read More →

22 days agoStandard Liege coach Preud’homme: Any Arsenal result a surprise

first_imgAbout the authorPaul VegasShare the loveHave your say Standard Liege coach Preud’homme: Any Arsenal result a surpriseby Paul Vegas22 days agoSend to a friendShare the loveStandard Liege coach Michel Preud’homme admits they’re rank outsiders going to Europa League opponents Arsenal.The former goalkeeper says any result would be a bonus.”Getting a result would be a surprise,” says Preud’homme. “Of course we all hope so. What the reality brings, however, we’ll only know tomorrow night. I have told my players to take advantage of this competition to give everything. With the ambition to get the most out of it. “We are going to try to play our football. Our biggest weapons? Every week, we are a team that tries to think collectively.” last_img read more

Read More →

14 days agoSampdoria defender Julian Chabot scouted by Everton

first_imgSampdoria defender Julian Chabot scouted by Evertonby Carlos Volcano14 days agoSend to a friendShare the loveSampdoria defender Julian Chabot is being watched by Everton.TMW says Everton had scouts posted at the Estadio Nuevo Arcangel in Cordova, where they checked on Chabot in action for Germany U21 against Spain. The defender was outstanding in the friendly, outshining Spain star Dani Olmo, of Dinamo Zagreb.Chabot only moved to Samp in May from Groningen for €3.7m.The defender is viewed at Samp as a long-term centre-half. TagsTransfersAbout the authorCarlos VolcanoShare the loveHave your saylast_img read more

Read More →

a day ago​Arsenal hero Petit: Nothing has changed since Wenger left

first_img​Arsenal hero Petit: Nothing has changed since Wenger leftby Freddie Taylora day agoSend to a friendShare the loveArsenal legend Emmanuel Petit does not see any differences between the end of Arsene Wenger’s time at the club and their performances now.Unai Emery has received time and backing at the club, as he is now into his second season as manager.But their performances and results are no better than what Wenger was achieving, and Emery arguably has a more balanced squad at his disposal.Petit told reporters: “I can understand why many Arsenal supporters are losing patience with Unai Emery.”As a manager he has a bad record away from home – not just with Arsenal, but also while he was in Spain.”Arsenal showed no character and it p***es me off because it has been the case so many times away from home.”The starting XI he picked against Sheffield United was strange.”It’s difficult after an international break when you have to play teams that don’t have as many players involved in the international fixtures.”But you know what to expect when you go to Bramall Lane – you know the qualities of the Sheffield United team.”They fight, especially in front of their home crowd, and they get balls into the box and put pressure on at set pieces.”That’s what they did against Liverpool and Chelsea.”But more importantly they didn’t show any technical quality on the pitch.”They gave away so many simple balls and had no inspiration, imagination or creativity.”They looked so heavy. This isn’t Arsenal – you need to take the ball and show what you’ve got.”But I haven’t seen that in years. Nothing has changed since Arsène Wenger left.” About the authorFreddie TaylorShare the loveHave your saylast_img read more

Read More →

Photos: Honeymooners Sporting Their Tux And Wedding Dress Are At Kentucky’s Game vs. South Carolina

first_imgHoneymooners in wedding tux and dress at Kentucky vs. South Carolina.It’s Valentine’s Day, so it’s fairly fitting that a recently married couple is attending Kentucky’s game against South Carolina at Rupp Arena this afternoon. The couple, which got married Friday night, is sitting in the upper section of the Wildcats’ arena, with the groom sporting his tuxedo and the bride still wearing her wedding dress. Check it out: Here’s our new favorite honeymooners sitting 1st row upper arena @Rupp_Arena after getting married last night pic.twitter.com/v6k9s9Bea5— Ryan Lemond (@ryanlemond) February 14, 2015There’s a bride at Rupp Arena today: pic.twitter.com/hmWR6RHcPx— Ashley Scoby (@AshleyScoby) February 14, 2015How grand is UK basketball? These fine Kentucky folks were just married in the Commonwealth’s church, Rupp Arena. #fb pic.twitter.com/1QwZNQMDOc— Benjamin Riggs (@bpriggs) February 14, 2015Woman in wedding dress watching basketball in second level of Rupp Arena. (Above A in Whitaker). pic.twitter.com/ZhmxF36x6Z— Brian Bennett (@BennettESPN) February 14, 2015Love and Basketball combine @Rupp_Arena for @KentuckyMBB vs South Carolina. #BBN #Bluelyweds pic.twitter.com/Na3HgVOs1C— KYwildcatsTV (@KYwildcatsTV) February 14, 2015Basketball, clearly, reigns supreme in the Bluegrass State. Kentucky and South Carolina are currently playing on ESPN.last_img read more

Read More →

Peace Country Pickleball Skills Development Clinic

first_imgFORT ST. JOHN, B.C. – Brook Siver, IPTPA Level 2 Certified Instructor and Elya Postma, IPTPA Level 1 Certified Instructor will lead an interactive Pickleball clinic to develop skills.Beginner Clinic – Monday, July 22, 2019(limited to 16 participants)5:30 pm-7:30pmIntermediate Clinic – Monday, July 22, 2019(limited to 16 participants)7:30 pm-9:30 pm $30.00 per person, paddles and balls will be availableTo register contact; rsipe@bluenova.ca or 250-262-5801To view the FB Event; CLICK HERElast_img read more

Read More →

Man arrested in Regina for sexual assault was in Dawson Creek and

first_imgDuke appeared in a Regina court on Friday and according to CBC Regina, was released on bail with no curfew or travel restrictions.  His next court appearance is August 20, 2019.Regina Police believe there is potential that other victims exist unreported. Duke has travelled across Canada, and was in Esterhazy from November of 2018 to February of 2019, and travelled from Fort Saskatchewan, Alberta to Dawson Creek and Taylor, British Columbia, in June and July 2019. Duke also has a campsite at Craven Country Campground. His travels are not limited to these areas, but these areas are locations of travel of which police are aware.Anyone with information is asked to contact the Regina Police Service at 306-777-6500, or your local law enforcement agency, or call Crime Stoppers at 1-800-222-8477 (TIPS).  The Regina Police Service thanks the public and the media for their assistance in this matter.Forty-nine-year-old Christopher Cameron Duke, of Regina, was charged with:2 X Sexual assault on a person under 16 years of age [CC 271];2 X Sexual Interference [CC 151]; and2 X Anal intercourse [CC 159(1)]. REGINA, S.K. – Regina Police are looking for potential sexual assault victims in Dawson Creek and Taylor after they arrested a 49-year-old man earlier this month.On August 1, 2019, at approximately 9:15 a.m., police were dispatched to a Regina residence for the report of a sexual assault of a 12-year-old female.  The incident occurred at the residence on the evening of July 31, 2019. An investigation into the incident led to a 49-year-old male, who was arrested and charged.Sexual Assault On A Minor https://t.co/gJMoSYsak1 pic.twitter.com/3Fw1CIAn9W— Regina Police (@reginapolice) August 7, 2019last_img read more

Read More →

Top Court Panel Rejects Centres Objection On 2 Judges Recommends 2 More

first_imgNEW DELHI: The Supreme Court today rejected the government’s objections to the elevation of two judges to the top court, stressing that merit should be considered above seniority. The Supreme Court collegium, or panel of five senior most judges, reiterated its April 12 decision to recommend Justices Aniruddha Bose and AS Bopanna for the top court. “Merit should be given predominant consideration,” the collegium said, noting that “nothing adverse regarding competence, conduct or integrity of the judges had been pointed out” by the government. Also Read – India gets first tranche of Swiss account details under automatic exchange framework Amid disagreement over the two names, the collegium today also recommended two more judges for the Supreme Court – Justices BR Gavai and Surya Kant. Justice Gavai is a judge of the Bombay High Court and Justice Kant is the Chief Justice of the Himachal Pradesh High Court. The collegium includes Chief Justice of India Ranjan Gogoi, Justice SA Bobde, Justice NV Ramana, Justice Arun Mishra and Justice RF Nariman. Reports suggest that the government had cited seniority and regional representation to send back the names recommended by the judges’ panel. Also Read – Trio win Nobel Medicine Prize for work on cells, oxygen “We have carefully considered the observations made by the Department of Justice while referring back to the Collegium,” the judges said. Aniruddha Bose is the Chief Justice of the Jharkhand High Court and AS Bopanna is Chief Justice, Gauhati High Court. “The Collegium is of the view that, as laid down by the Supreme Court, though seniority amongst Judges in their High Courts and their combined seniority on all-India basis should be given due weightage, merit should be the predominant consideration,” the judges said. While recommending two new names, the Supreme Court said it had considered their seniority, competence, conduct and integrity. With Justice BR Gavai’s elevation, added the collegium, “the Supreme Court Bench will have a Judge belonging to Scheduled Caste category after about a decade.” The Supreme Court has a sanctioned strength of 31 judges but is working with 27. with inputs of NDTVlast_img read more

Read More →

Morocco Nearly 827000 women have experienced sexual abuse

first_imgSidi Ifni, Morocco- According to the Moroccan High Commission Plan, nearly 827,000 Moroccan women have suffered sexual abuse at a certain point in their lives. The victimized women are aged between 18 to 64 years old.The phenomenon of sexual violence against women has grown rampant. In a survey conducted by HCP in 2009, 38,000 women experienced forced sexual intercourse at least once in their lives.Celebrated every year on November 25, the International Day for the Elimination of Violence against Women reminds the world of the injustices done against women and pushes the authorities to take action. Some husbands are reported to have raped their wives. According to the study, this is also considered as cases of sexual violence.In every Moroccan household, nearly 6.6% of women or 444,000 women admit to having experienced sexually violent acts. 45.1% of these acts are inflicted by the husband, reported HCP.The youngest women (18-24), the survey shows, are the most affected by sexual violence.This threatening fact is sounding alarms for the authorities to intervene to alleviate the problem.Recently, Moroccan lawmakers drafted a bill threatening jail terms for the perpetrators of sexual harassment.Women’s rights groups continue to express their disgruntlement over the policies of the government as regards criminalizing sexual abuse.While marital rape has been overlooked in the draft bill, women rights activists complain about not being involved in the initiatives being taken to alleviate this violence.“I regret that women’s rights groups have not been involved in drafting the bill,” said Nouzha Skalli, former family and social development minister, as quoted by AFP.© Morocco World News. All Rights Reserved. This material may not be published, rewritten or redistributedlast_img read more

Read More →

Conte praised Pochettinos qualities

first_imgAntonio Conte praised Mauricio Pochettino and his coaching qualities as these two are about to face in the upcoming match – and the Italian coach defended his opponent’s inability to win a trophy with his team…Pochettino has been the Tottenham head coach for four years and he hasn’t managed to win a trophy there yet – but Conte is certain that is has nothing to say about his qualities as he is still a great manager.The former Juventus coach spoke about his upcoming opponent as he said, according to Talk Sport:“I consider Mauricio Pochettino a really good manager.”“I think that, if Tottenham grew a lot in this period, he has a lot of credit for that.”Stefano Sensi, inter milanReport: Inter go top with win over Udinese George Patchias – September 14, 2019 Inter Milan are top of Serie A after beating Udinese to make it three wins out of three.Antonio Conte’s career at Inter Milan, could…“We are talking about a team who, in the last period for many years now, they are competing to win the title.”“Two years ago, they were very close to winning the title when Leicester won it. Last season they tried to compete with us.”“Don’t forget that only one team can win the title.”“You start every competition with six teams, six top teams who are ready to win something during the season.”“For example, last season, Chelsea won the title, Manchester United won the Carabao Cup, and Arsenal won the FA Cup.”last_img read more

Read More →

4 held for smuggling Pangolin scales

first_imgDarjeeling: Three persons from Sikkim and one from Bengal have been arrested by foresters of Baikanthapur Division of North Bengal for smuggling Pangolin scales to Bhutan.The foresters had received information that Pangolin scales were being smuggled to Bhutan. “From early in the morning we positioned ourselves at Rongpu on the Sikkim-Bengal border. Around 1:45 pm they arrived in a speeding vehicle. We arrested four persons and recovered 2 kg 400 gm of Pangolin skin,” said Sanjay Dutta, range officer, Belakoba Range. The four arrested include Kamal Kumar Sinha (70 years) of Yangyang, Dal Bahadur Thapa (65 years) of Gangtok, Passang Tshering Bhutia (43 years) of Yangyang and Wangsten Sherpa Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: Mamata(24 years) of Kalimpong. The vehicle has also been seized. They were charged under the Wildlife Act and produced at the Jalpaiguri Court. “During interrogation we found out that around 10 to 12 Pangolins were killed in Sikkim and the scales taken out. The scales were being taken to Bhutan,” the ranger said. The scales are sold at very high cost and used in traditional medicines in some countries like China. Pangolins are endangered animals. The role of certain transporters in Siliguri is also being probed.last_img read more

Read More →

Choosing the Best Data Storage Solution

first_img Sooner or later, your small business will need more space for data storage. Information in the form of e-mails, documents, presentations, databases, graphics, audio files and spreadsheets is the lifeblood of most companies, and the applications that run and protect your business require a lot of disk space. In addition, a number of trends are fueling our growing hunger for storage: Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Which applications generate the largest amount of files? Which applications run on which servers? How old is the data? How much of it is duplicate or stale? How much is not business related? How quickly do you need to be able to access that data? From what locations do you need to access which data? Storing information and managing its storage is critical to a company’s behind-the-scenes success. Fortunately, there are many options available to small businesses for both the actual storage and the location of that storage. Often, the best solution is a combination of different storage options.So how do you decide what’s best for you? First, you’ll want to consider your storage needs in terms of both capacity and physical location. Then you should look at the storage options that best fit those needs. Lastly, you need to develop a plan for implementing your chosen storage solutions.What are Your Storage Needs?Small businesses should first assess the storage needs associated with their applications, their data, and how and where they need to access that data. These questions will help you get started: Once you’re able to get a handle on how much data you’re dealing with and the how, when and where of accessing that data, then you’ll have a better idea about your storage needs.Consider Your Storage OptionsFrom flash memory to network-area storage, small businesses have more storage choices than ever before. They range from portable flash memory thumb drives to network-attached storage systems that can be located physically anywhere on a network. Here’s a more detailed look at some of your options:Flash memory thumb drives. These type of drives are particularly appealing to mobile professionals because they consume little power, are small enough to fit on a keychain and have no moving parts. You can connect a flash memory thumb drive to your laptop’s USB port to back up files on the road. Some USB thumb drives even provide encryption to protect your files should the drive get lost or stolen. Some let you store your Outlook data (such as recent e-mails and calendar items), Internet Explorer bookmarks, files and even some desktop applications. That way, you can leave your laptop at home and just plug the USB drive into a borrowed computer.External hard drives. A simple and relatively inexpensive way to add more storage is to connect an external hard disk drive to your computer. External hard drives directly connected to PCs have several disadvantages, however. Any files stored on the drive but not elsewhere need to be backed up. Also, if you travel for work and need access to files on an external drive, you’ll have to take the drive with you or remember to copy the required files to a USB thumb drive, your laptop’s internal drive, a CD or some other storage media. Finally, in the event of a fire or other catastrophe at your place of business, your data will not be protected.Online storage. Services that provide remote storage and backup over the internet offer businesses a number of compelling benefits. By backing up your most important files to a secure, remote server, you’re protecting the data stored at your place of business. You can easily share large files with clients, partners and others by providing them with password-protected access to your online storage service, thereby eliminating the need to e-mail those large files. And in most cases, you can log into your account from any computer using a web browser–a great way to retrieve files when you’re away from your PC. Remote storage–especially during an initial backup session–can be slow, however: It’s only as quick as the speed of your network access to that storage. For extremely large files, you may have to invest in higher speed network access.Network-attached storage. Network-attached storage (NAS) provides fast, simple, reliable access to data in an IP networking environment. NAS solutions are suitable for small and mid-sized businesses needing large amounts of economical storage that multiple users can share over a network. And given that many small businesses lack IT departments, NAS solutions are easy to deploy, centrally manage and consolidate.NAS solutions can be as basic as a single hard drive with an Ethernet port or built-in Wi-Fi connectivity costing around $200 for 300GB or more. Moving up in sophistication, NAS solutions can also provide additional USB and FireWire ports, enabling you to connect external hard drives to scale your business’s overall storage capacity. An NAS solution may also offer print-server capabilities, which lets multiple users easily share a single printer.An NAS solution may include multiple hard drives in a RAID (Redundant Array of Independent Disks) level 1 array. In plain English, a RAID level 1 storage system includes two or more equivalent hard drives (such as two 250 GB drives) in one network-connected device. Files written to the main drive are automatically written to the second drive as well. This automated redundancy means that if the first hard drive dies, you’ll still have access to all your applications and files on the second drive.NAS solutions can also offload file serving from other servers on your network, thereby increasing performance. A NAS system allows you to consolidate storage, thereby increasing efficiency and reducing costs; simplify storage administration and data backup and recovery; and allow for easy scaling to meet growing storage requirements.Develop a PlanBefore investing in a data storage solution, consult with a trusted IT advisor on which option–or options–will best meet your business’s current and future needs. Then create a plan for deploying the storage your business is likely to need when and where it will be needed.You may want to consider a managed storage service, which provides on-demand storage capacity and essential storage management. A managed service–for which you pay a regular monthly fee–may be the most affordable option for cash-strapped small businesses. Another possibility is to ask your network vendor about financing options for NAS solutions.The bottom line: Don’t wait until you need more storage before deciding what to do. Start planning now for your future storage needs, so you won’t waste time and money later. Recent government regulations, such as Sarbanes-Oxley, require businesses to maintain and back up a variety of data they might have otherwise deleted. For legal reasons, many small businesses are now archiving e-mail messages dating back five or more years. The pervasiveness of viruses and spyware requires ever-more vigilant backups–which requires ever-more storage capacity. Each new version of a software application or operating system demands more hard-drive real estate than its predecessor. The growing need to store large media files, such as video, and make them available to users on a network is generating demand for more sophisticated storage solutions. Opinions expressed by Entrepreneur contributors are their own. This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Enroll Now for Freelast_img read more

Read More →

Red Team Tactics Getting started with Cobalt Strike Tutorial

first_imgAccording to cobaltstrike.com: “Cobalt Strike is a software for Adversary Simulations and Red Team Operations. Adversary Simulations and Red Team Operations are security assessments that replicate the tactics and techniques of an advanced adversary in a network. While penetration tests focus on unpatched vulnerabilities and misconfigurations, these assessments benefit security operations and incident response.” This tutorial is an excerpt taken from the book Hands-On Red Team Tactics written by Himanshu Sharma and Harpreet Singh. This book demonstrates advanced methods of post-exploitation using Cobalt Strike and introduces you to Command and Control (C2) servers and redirectors. In this article, you will understand the basics of what Cobalt Strike is, how to set it up, and also about its interface. Before installing Cobalt Strike, please make sure that you have Oracle Java installed with version 1.7 or above. You can check whether or not you have Java installed by executing the following command: java -version If you receive the java command not found error or another related error, then you need to install Java on your system. You can download this here: https://www.java.com/en/. Cobalt Strike comes in a package that consists of a client and server files. To start with the setup, we need to run the team server. The following are the files that you’ll get once you download the package: The first thing we need to do is run the team server script located in the same directory. What is a team server? This is the main controller for the payloads that are used in Cobalt Strike. It logs all of the events that occur in Cobalt Strike. It collects all the credentials that are discovered in the post-exploitation phase or used by the attacker on the target systems to log in. It is a simple bash script that calls for the Metasploit RPC service (msfrpcd) and starts the server with cobaltstrike.jar. This script can be customized according to the needs. Cobalt Strike works on a client-server model in which the red-teamer connects to the team server via the Cobalt Strike client. All the connections (bind/reverse) to/from the victims are managed by the team server. The system requirements for running the team server are as follows: System requirements: 2 GHz+ processor 2 GB RAM 500MB+ available disk space Amazon EC2: At least a high-CPU medium (c1.medium, 1.7 GB) instance Supported operating systems: Kali Linux 1.0, 2.0 – i386 and AMD64 Ubuntu Linux 12.04, 14.04 – x86, and x86_64 The Cobalt Strike client supports: Windows 7 and above macOS X 10.10 and above Kali Linux 1.0, 2.0 – i386 and AMD64 Ubuntu Linux 12.04, 14.04 – x86, and x86_64 As shown in the following screenshot, the team server needs at least two mandatory arguments in order to run. This includes host, which is an IP address that is reachable from the internet. If behind a home router, you can port forward the listener’s port on the router. The second mandatory argument is password, which will be used by the team server for authentication: The third and fourth arguments specify a Malleable C2 communication profile and a kill date for the payloads (both optional). A Malleable C2 profile is a straightforward program that determines how to change information and store it in an exchange. It’s a really cool feature in Cobalt Strike. The team server must run with the root privileges so that it can start the listener on system ports (port numbers: 0–1023); otherwise, you will receive a Permission denied error when attempting to start a listener: The Permission denied error can be seen on the team server console window, as shown in the following screenshot: Now that the concept of the team server has been explained, we can move on to the next topic. You’ll learn how to set up a team server for accessing it through Cobalt Strike. Cobalt Strike setup The team server can be run using the following command: sudo ./teamserver 192.168.10.122 harry@123 Here, I am using the IP 192.168.10.122 as my team server and harry@123 as my password for the team server: If you receive the same output as we can see in the preceding screenshot, then this means that your team server is running successfully. Of course, the SHA256 hash for the SSL certificate used by the team server will be different each time it runs on your system, so don’t worry if the hash changes each time you start the server. Upon successfully starting the server, we can now get on with the client. To run the client, use the following command: java -jar cobaltstrike.jar This command will open up the connect dialog, which is used to connect to the Cobalt Strike team server. At this point, you need to provide the team server IP, the Port number (which is 50050, by default), the User (which can be any random user of your choice), and the Password for the team server. The client will connect with the team server when you press the Connect button. Upon successful authorization, you will see a team server fingerprint verification window. This window will ask you to show the exact same SHA256 hash for the SSL certificate that was generated by the team server at runtime. This verification only happens once during the initial stages of connection. If you see this window again, your team server is either restarted or you are connected to a new device. This is a precautionary measure for preventing Man-in-the-Middle (MITM) attacks: Once the connection is established with the team server, the Cobalt Strike client will open: Let’s look further to understand the Cobalt Strike interface so that you can use it to its full potential in a red-team engagement. Cobalt Strike interface The user interface for Cobalt Strike is divided into two horizontal sections, as demonstrated in the preceding screenshot. These sections are the visualization tab and the display tab. The top of the interface shows the visualization tab, which visually displays all the sessions and targets in order to make it possible to better understand the network of the compromised host. The bottom of the interface shows the display tab, which is used to display the Cobalt Strike features and sessions for interaction. Toolbar Common features used in Cobalt Strike can be readily accessible at the click of a button. The toolbar offers you all the common functions to speed up your Cobalt Strike usage: Each feature in the toolbar is as follows: Connecting to another team server In order to connect to another team server, you can click on the + sign, which will open up the connect window: All of the previous connections will be stored as a profile and can be called for connection again in the connect window: Disconnecting from the team server By clicking on the minus (–) sign, you will be disconnected from the current instance of the team server: You will also see a box just above the server switchbar that says Disconnected from team server. Once you disconnect from the instance, you can close it and continue the operations on the other instance. However, be sure to bear in mind that once you close the tab after disconnection, you will lose all display tabs that were open on that particular instance. What’s wrong with that? This may cause some issues. This is because in a red-team operation you do not always have the specific script that will execute certain commands and save the information in the database. In this case, it would be better to execute the command on a shell and then save the output on Notepad or Sublime. However, not many people follow this practice, and hence they lose a lot of valuable information. You can now imagine how heart-breaking it can be to close the instance in case of disconnection and find that all of your shell output (which was not even copied to Notepad) is gone! Configure listeners For a team server to function properly, you need to configure a listener. But before we can do this, we need to know what a listener actually is. Just like the handler used in Metasploit (that is, exploit/multi/handler), the Cobalt Strike team server also needs a handler for handling the bind/reverse connections to and from the target/victim’s system/server. You can configure a listener by clicking on the headphones-like icon: After clicking the headphones icon, you’ll open the Listeners tab in the bottom section. Click on the Add button to add a new listener: You can choose the type of payload you want to listen for with the Host IP address and the port to listen on for the team server or the redirector: In this case, we have used a beacon payload, which will be communicating over SSL. Beacon payloads are a special kind of payload in Cobalt Strike that may look like a generic meterpreter but actually have much more functionality than that. Beacons will be discussed in more detail in further chapters. As a beacon uses HTTP/S as the communication channel to check for the tasking allotted to it, you’ll be asked to give the IP address for the team server and domain name in case any redirector is configured (Redirectors will be discussed in more details in further chapters): Once you’re done with the previous step, you have now successfully configured your listener. Your listener is now ready for the incoming connection: Session graphs To see the sessions in a graph view, you can click the button shown in the following screenshot: Session graphs will show a graphical representation of the systems that have been compromised and injected with the payloads. In the following screenshot, the system displayed on the screen has been compromised. PT is the user, PT-PC is the computer name (hostname), and the numbers just after the @ are the PIDs of the processes that have the payload injected into them: When you escalate the privileges from a normal user to NT AUTHORITY\SYSTEM (vertical privilege escalation), the session graph will show the system in red and surrounded by lightning bolts. There is also another thing to notice here: the * (asterisk) just after the username. This means that the system with PID 1784 is escalated to NT AUTHORITY\SYSTEM: Session table To see the open sessions in a tabular view, click on the button shown in the following screenshot: All the sessions that are opened in Cobalt Strike will be shown along with the sessions’ details. For example, this may include external IP, internal IP, user, computer name, PID into which the session is injected, or last. Last is an element of Cobalt Strike that is similar to WhatsApp’s Last Seen feature, showing the last time that the compromised system contacted the team server (in seconds). This is generally used to check when the session was last active: Right-clicking on one of the sessions gives the user multiple options to interact with, as demonstrated in the following screenshot: These options will be discussed later in the book. Targets list To view the targets, click on the button shown in the following screenshot: Targets will only show the IP address and the computer name, as follows: For further options, you can right-click on the target: From here, you can interact with the sessions opened on the target system. As you can see in the preceding screenshot, PT@2908 is the session opened on the given IP and the beacon payload resides in the PID 2908. Consequently, we can interact with this session directly from here: Credentials Credentials such as web login passwords, password hashes extracted from the SAM file, plain-text passwords extracted using mimikatz, etc. are retrieved from the compromised system and are saved in the database. They can be displayed by clicking on the icon shown in the following screenshot: When you perform a hashdump in Metasploit (a post-exploitation module that dumps all NTLM password hashes from the SAM database), the credentials are saved in the database. With this, when you dump hashes in Cobalt Strike or when you use valid credentials to log in, the credentials are saved and can be viewed from here: Downloaded files To view all the exfiltrated data from the target system, you can click on the button shown in the following screenshot: This will show the files (exfiltration) that were downloaded from the target system: Keystrokes This option is generally used when you have enabled a keylogger in the beacon. The keylogger will then log the keystrokes and send it to the beacon. To use this option, click the button shown in the following screenshot: When a user logs into the system, the keylogger will log all the keystrokes of that user (explorer.exe is a good candidate for keylogging). So, before you enable the keylogger from the beacon, migrate or inject a new beacon into the explorer.exe process and then start the keylogger. Once you do this, you can see that there’s a new entry in the Keystrokes tab: The left side of the tab will show the information related to the beacon. This may include the user, the computer name, the PID in which the keylogger is injected, and the timestamp when the keylogger sends the saved keystrokes to the beacon. In contrast, the right side of the tab will show you the keystrokes that were logged. Screenshots To view the screenshots from the target system, click on the button shown in the following screenshot: This will open up the tab for screenshots. Here, you will get to know what’s happening on the system’s screen at that moment itself. This is quite helpful when a server administrator is logged in to the system and works on Active Directory (AD) and Domain Controller (DC) settings. When monitoring the screen, we can find crucial information that can lead to DC compromise: To know about Payload generation in stageless Windows executable, Java signed applet, and MS Office macros, head over to the book for a complete overview. Scripted web delivery This technique is used to deliver the payload via the web. To continue, click on the button shown in the following screenshot: A scripted web delivery will deliver the payload to the target system when the generated command/script is executed on the system. A new window will open where you can select the type of script/command that will be used for payload delivery. Here, you also have the option to add the listener accordingly: File hosting Files that you want to host on a web server can also be hosted through the Cobalt Strike team server. To host a file through the team server, click on the button shown in the following screenshot: This will bring up the window where you can set the URI, the file you want to host, the web server’s IP address and port, and the MIME type. Once done, you can download the same file from the Cobalt Strike team server’s web server. You can also provide the IP and port information of your favorite web redirector. This method is generally used for payload delivery: Managing the web server The web server running on the team server, which is generally used for file hosting and beacons, can be managed as well. To manage the web server, click on the button shown in the following screenshot: This will open the Sites tab where you can find all web services, the beacons, and the jobs assigned to those running beacons. You can manage the jobs here: Server switchbar The Cobalt Strike client can connect to multiple team servers at the same time and you can manage all the existing connections through the server switchbar. The switchbar allows you to switch between the server instances: You can also rename the instances according to the role of the server. To do this, simply right-click on the Instance tab and you’ll get two options: Rename and Disconnect: You need to click on the Rename button to rename the instance of your choice. Once you click this button, you’ll be prompted for the new name that you want to give to your instance: For now, we have changed this to EspionageServer: Renaming the switchbar helps a lot when it comes to managing multiple sessions from multiple team servers at the same time. To know more about how to customize a team server head over to the book. To summarize, we got to know what a team server is, how to setup Cobalt Strike and about the Cobalt Strike Interface. If you’ve enjoyed reading this, head over to the book, Hands-On Red Team Tactics to know about advanced penetration testing tools, techniques to get reverse shells over encrypted channels, and processes for post-exploitation. Read Next “All of my engineering teams have a machine learning feature on their roadmap” – Will Ballard talks artificial intelligence in 2019 [Interview] IEEE Computer Society predicts top ten tech trends for 2019: assisted transportation, chatbots, and deep learning accelerators among others Facebook releases DeepFocus, an AI-powered rendering system to make virtual reality more reallast_img read more

Read More →

Wieners and onesies among ways to celebrate the holiday season

first_img Wednesday, December 21, 2016 By: Mike Fuhrmann Share Wieners and onesies among ways to celebrate the holiday seasoncenter_img HALIFAX — How do Canadians with different traditions celebrate the holiday season?With dancing, rigatoni and wiener roasts, according to a display at the Canadian Museum of Immigration at Pier 21.In some households, pyjamas play a major role in the festivities.The Halifax museum is inviting visitors to provide details about their holiday customs, and displaying their notes in its Hall of Tribute.The entries run the gamut from dining to dancing and cover Christmas, Hanukkah, Diwali and the lunar new year, said Ann-Marie Begin, a heritage interpreter at the museum.“One family says that on New Year’s Day they’ve had a wiener roast in the provincial park at Goldstream (near Victoria, on Vancouver Island) every year for 35 years, rain or snow,” Begin said.Several people have mentioned wearing pyjamas while unwrapping gifts, or receiving pyjamas as a gift, “and that being the one gift they’re allowed to open on Christmas Eve.”Besides adding to the display, some visitors appear to be picking up ideas to adopt in their own homes. A case in point is one family’s Christmas tradition that involves everyone wearing matching onesies on which their names are embroidered.More news:  Can you guess the one and only hotel company to rank on Indeed’s Top Workplaces in Canada list?“And I actually had someone come up to me and say, ‘Do you know where I can get matching onesies for my whole family that I can get embroidered?”’ Begin recalled.“She liked that tradition so much that she wanted to start it with her own family. It’s been neat to see that kind of sharing of traditions.”So what do Canadians do during the holiday season? Here’s a sampling from the display:— “Mummering or ‘Jannying’ between Christmas and New Years. A Newfoundland tradition! And lots of fun!”— “Tortiere after midnight on Christmas Eve and open one present!” a Quebecer wrote.— “At New Year’s, me and my family throw money and coins at midnight. It’s something we’ve always done and it brings the family together.” Written by a 23-year-old from Brampton, Ont.— “New Year’s Eve. Polenta. Yum.”— “Chrismukkah! We decorate the house w/ a Hanukkah bush and xmas tree! We have a big holiday dinner w/ traditional Jewish dishes like latkes, roast beef and potatoes, brisket, chopped liver, etc. On xmas we have rigattoni w/ homemade sauce and meatballs.” The multi-coloured note concludes with a smiley face. << Previous PostNext Post >>last_img read more

Read More →

February 8 2013Cosanti this week hosted a special

first_imgFebruary 8, 2013Cosanti this week hosted a special evening for the Concierges and tour directors of many of the resort hotels in the Phoenix Valley, and also the staff of WHERE magazine. WHERE is the guidebook that is in every hotel room in our region. Our advertising figures prominently in each issue.These tourism professionals, several of whom we have known for many years, are important to the life of both Cosanti and Arcosanti. They are the ones who when asked by winter guests, “What are the most interesting places we could visit today?” answer, “You must see Cosanti and Arcosanti and the famous Soleri Windbells!”[Photos and text by Cosanti Foundation President Jeff Stein]Our sunset reception this past Wednesday evening, an in-depth tour of Cosanti by Roger Tomalty, and a dramatic night-time bronze pour by the Cosanti foundry staff were all meant to show these friends, new and old, why visitors to Arizona should not return home without experiencing the ideas, sights and sounds embodied by the fantastic architectural spaces that are Cosanti and Arcosanti.As you read this now, we hope you, too, are planning to visit this winter.  We look forward to seeing you here!last_img read more

Read More →

Finnish telco DNAs digitalterrestrial network no

first_imgFinnish telco DNA’s digital-terrestrial network now reaches 70% of the country’s population, with the company planning to expand coverage to 100% by the end of this year.DNA said demand for pay TV services “remained steady” in the fourth quarter. The company launched pay TV services on the terrestrial network in August.DNA had 602,000 cable subscribers at the end of December, up 3,000 on the previous quarter. The company had 299,000 fixed broadband subscribers at the end of the year, up 5,000 on the previous quarter. DNA reported net sales of €727.5 million and EBITDA of €188.4 million for the full year.last_img read more

Read More →

ShareTweet

first_imgShareTweet Lyra McKee and partner Sara Canning. Lyra had plans to propose to Sara and marry herTHE heartbroken mother of murdered journalist Lyra McKee has left an emotional message to her at the spot where she was shot dead.Joan McKee and her family left floral tributes at Fanad Drive in Creggan where the 29-year-old was savagely killed. Lyra, who was from north Belfast but was living in Derry with her partner Sara Canning, was shot in the head while observing rioting in Creggan on Thursday, April 18.A masked New IRA gunman appeared from the shadows and opened fire on an armoured police landrover.The author and writer, who was standing beside the vehicle, was struck once to the head with a round from a handgun.The murder sparked a furious backlash with dissident republican political group Saoradh becoming the focus of public anger. CRegganDISSIDENT REPUBLICANSFANAD DRIVEJoan McKeeLyra McKee’s family leave emotional messages at murder scene in CregganPolicePSNISAORADH Friends of the murdered woman staged a protest at Junior McDaid House, the party’s headquarters, daubing red handprints on the walls. The party’s Twitter account was also suspended.In an emotional message left on flowers at the scene where she died, Ms McKee’s family said: “Our dear baby sister Lyra. “Our hearts are broken as your sweet life was stolen.“You will forever dwell in our souls. Sweet heart. We love you and will miss you until we meet again.”The card, accompanied by yellow roses, was signed by Nichola, Gary, Mark, Joan, Mary David, John, Kevin, Susan and Nicola.A separate tribute penned by Joan McKee, read simply: “To my darling baby daughter, Lyra. Will miss you forever. All my love, mum, xxx.”There has been a steady stream of sympathisers from across Ireland visiting the spot of her horrific murder.They have been leaving flowers, gifts and messages of support for her family, friends and partner Sara Canning.The suspected New IRA killer who shot dead Lyra McKee in Derry’s Creggan on Thursday, April 18The family’s visit came after pro-IRA graffiti and messages around Creggan warning people against cooperating with police was replaced with inspirational messages. The move came after talks between Creggan Neighbourhood Partnership and dissident republican group Saoradh.Three people – a 57-year-old woman and two males aged 18 and 19 – were subsequently arrested over her murder but were later released unconditionally.Independent charity Crimestoppers has offered a reward of up to £10,000 for information which leads to the arrest and successful conviction of those involved in Lyra’s murder.Lyra McKee’s family leave emotional messages at murder scene in Creggan was last modified: May 8th, 2019 by John2John2 Tags:last_img read more

Read More →

By Doug Hornig Casey Research On June 18 the Fe

first_imgBy Doug Hornig, Casey ResearchOn June 18, the Federal Reserve and FDIC circulated a letter to banks that proposes to harmonize US regulatory capital rules with Basel III.BASEL III is an accord that tells a bank how much capital it must hold to safeguard its solvency and overall economic stability.It’s a global standard on bank capital adequacy, stress testing, and market liquidity risk.Here’s the important bit:At the top of the proposed changes is the new list of “zero-percent risk weighted items,” which now includes “gold bullion,” right after “cash.”That’s the part to take notice of.If the proposals are approved by regulators – and that seems likely since adoption of Basel III will be– then this is a momentous change for the gold market.Now banks will be allowed to hold bullion in their vaults and count it among their Tier 1 assets – in other words, the least risky assets.That by itself would be bullish for the gold price, as banks that recognize gold’s unique characteristics seek to stockpile more of it.But that’s not the whole story…Gold Regains Money StatusFor one thing, Basel III also stipulates that a bank’s Tier 1 holdings must rise from 4% of assets to 6%.That means that banks may not only replace a portion of their existing paper with bullion, but may use it to meet some of the extra 2% as well.In addition, this vote of confidence from the highest monetary authorities gives further impetus to the remonetization of gold.In essence, what’s happening is that from now on gold will be considered “money” in virtually the same way as cash or bonds.And banks will be given the choice between holding more of their core assets in history’s most reliable store of value vs. paper backed by nothing more than the promises of increasingly wasteful governments.Finally, there is the impact on individual and institutional investors.Jeff Clark, in Casey Research’s BIG GOLD newsletter, has been guiding gold investors for years. In his view, this news looks set to really shake up the gold market, because as regulators and banks increasingly view gold as having safety on a par with the various paper alternatives, it is logical that they will also see the need to beef up their own holdings.There are a number of positives for gold going forward.Though it remains speculation on our part, we believe that the net result of Basel III and associated adjustments to US regulations will be an increased recognition of gold’s safe-haven status across all markets.And that translates into higher global demand for the metal next year, and a concomitant increase in its price.If you haven’t done so already, it’s time to get informed on gold and begin adding it to your portfolio.last_img read more

Read More →