Sunday, May 31, 2020
Fw:债务转股权方案,有效控制您���业采购成本
Tuesday, May 26, 2020
RE:股权激励,你知道多少?
“谁出的钱多,谁占大股”,这句话真的让很多公司发起人、公司创始人误入歧途。 如果“资金型股东”一直不参与日常管理,却又喜欢对“关键事”指手画脚,你怎么办???
①合伙创业如何选择合伙人?比例如何设计?
②技术型,资金型,资源型,管理型股东该如何分配股份?
③股权激励什么时候分,分给哪些人,分多少?
④股权激励要不要花钱,员工没钱怎么办?
⑤我们做股权激励最常犯的7大致命误区是什么?如何解决?
⑥退出机制如何设定?如何根据不同的情况回购股权?
⑦不同类型的企业如何给公司估值?如何对内外部股权作价?
时间: 晚上20:00-22:00
学习地址: 微信群
授课形式: 语音+文字+图片+案例
课后可与老师一对一咨询】
立即报名即可免费赠送以下资料:
1、股权激励设计方案 1份
2、股权分配方案 1份
3、股权投资合作协议书范本 1份
4、公司股份合作协议书 1份
5、公司增资扩股协议书 4份
6、公司股权分配协议 1份
7、初创公司的股权架构设计 1份
8、众筹路演PPT模版 1份
9、商业模式计划书模板 1份
10、绩效考核方案 1份
11、股权退出协议 1份
12、股权质押合同 1份
13、股权融资方案 1份
14、分红协议书 1份
15、股权赠予协议 1份
16、股权认购协议书 4份
17、股权激励方案书 4份
18、员工入股合作协议书 8份
19、创业合伙股权认购书 8份
20、商业模式策划方案 8份
21、投资入股协议书 3份
学习费用:【168元】
咨询问题请添加老师微信: Alonge8 (备注:学习).
Sunday, May 24, 2020
Re:企业如何才能拿到国家疫情下的补贴方案?
2天1夜《股权激励+绩效+薪酬+股改》方案班:
授课内容:我们两天一夜都是由同一个老师主讲,第一天讲如何打造内部合伙人制度,怎么在薪酬成本的情况下,激发员工动力,课程结束还有一对一咨询辅导,有个性化的问题可单独咨询辅导老师;
第二天主讲如何用股权杠杆资源,资金整合,上下游打通,直接降低企业的运营成本,让您学会怎么跟市场拿钱,怎么跟政策拿钱等..
两天一夜同一个导师授课,全国统一售价980元/每人,全国各地每个月开100多场,每个月至少1万多人学习。
报名链接:https://jinshuju.net/f/r38RMf
1、股权怎么分,分多少,分给谁?
2、股东之间的矛盾如何合理解决?
3、股东进入与退出的机制条件设定?
4、如何公司股权架构顶层设计,吸引投资人?
5,内部如何股权激励,股权融资,股权众筹?
6,外部如何通过股权资源整合,商业模式创新等?
7,如何处理股东分红与员工的工资福利的关系?
8,怎么才能调动员工的工作能动性、责任心和积极性?
9,在工作中如何下方放权利?解放老板身心,暴增员工业绩?
10、老板在公司占怎么样的股份比例合理?老股东不愿意退出怎么办?
—————
这是2天1夜的精品班,全程都只有一个老师分享,白天授课,晚上一对一咨询,个性化辅导,一站式为您解决绩效+薪酬+股改等问题,让您带着问题来,带着结果回去;
—————
【课程时间地点安排】
5月16-17 惠州 海口 昆明 洛阳 郑州 广州 柳州 南京 重庆
5月17-18 成都
5月18-19 湖北十堰
5月19-20 中山 杭州 兰州 泉州
5月20-21 广州 青海 石家庄 西安 南昌 温州
5月22-23 东莞
5月23-24 中山 南宁 北京 贵阳 长沙 株洲 西藏 淄博 深圳
5月24-25 沈阳
5月25-26 福州
5月26-27 山东德州 青岛 深圳
5月27-28 佳木斯 济南 佛山 上海 合肥
5月28-29 广州 淄博 南京 无锡 重庆 厦门
5月30-31 杭州 成都 深圳 中山 海口 西安 郑州 昆明 长沙 山西
......
(会场消毒、控制人数)
优惠名额:980元/人(场地费+学习资料费+茶水费+咨询费)
适宜人群:企业家,合伙人,法人,总经理,董事长,股东,创业者等
报名微信:15626123923 区老师
(电话同步,添加备注“报名”)
【详细了解链接】:https://jinshuju.net/f/r38RMf
报名加我回复:参加城市
Friday, May 22, 2020
Odysseus
Download: http://www.bindshell.net/tools/odysseus
Setting Up A Burp Development Environment
For this guide you will need the following items:
- Eclipse IDE for Java Developers - http://www.eclipse.org/downloads/moreinfo/java.php
- BurpSuite Free - http://portswigger.net/burp/download.html
- Burp Extender classes - http://portswigger.net/burp/extender/
- http://portswigger.net/burp/extender/IBurpExtender.java
- http://portswigger.net/burp/extender/IBurpExtenderCallbacks.java
- http://portswigger.net/burp/extender/IHttpRequestResponse.java
- http://portswigger.net/burp/extender/IScanIssue.java
- http://portswigger.net/burp/extender/IScanQueueItem.java
- http://portswigger.net/burp/extender/IMenuItemHandler.java
After downloading and opening up Eclipse you will need to create a new java project. This can be done by clicking "File->New Java Project". Fill in a project name and click finish.
Once the project has been created you will need to create a new package called "burp". This can be done by right clicking the "src" folder under your new project and selecting "New->Package". When the dialog comes up set the "Name" as "burp":
You should now have a package named "burp" under the source folder in the right pane. Now you will need to import the Burp extender classes into your project. Download all of the extender classes to a local folder, once this is done right click on the "burp" package in your project and select "Import". On the dialog window that comes up select "General->File System" and hit "next":
On the next dialog you will need to navigate to where you downloaded the Burp extender classes to. Once you have done this you should see the classes, click on the folder to select all items and click "Finish":
Next we can add the Burp application into the project. To do this click on "Project->Properties" on the top toolbar. When the dialog opens select "Java Build Path" and then the "Libraries" tab. On this dialog click "Add External JARs..."
Navigate to where ever you have Burp downloaded to and select it. After you have done this click "OK" to dismiss the dialog. You are now ready to build your own Burp extensions. You can test your environment by creating a new class in the burp package named "BurpExtender". Right click the "burp" package and click "New->Class". On the dialog that comes up enter "BurpExtender" and click "Finish":
In the "BurpExtender" class you can enter the following:
package burp;
public class BurpExtender
{
public void registerExtenderCallbacks(IBurpExtenderCallbacks callbacks)
{
callbacks.registerMenuItem("Hello World.", new CustomMenuItem());
}
}
class CustomMenuItem implements IMenuItemHandler
{
public void menuItemClicked(String menuItemCaption, IHttpRequestResponse[] messageInfo)
{
try
{
System.out.println("Hello From Burp!");
System.out.println("Request Item Details");
System.out.println("Host: " + messageInfo[0].getHost());
System.out.println("URL: " + messageInfo[0].getUrl());
}
catch (Exception e)
{
e.printStackTrace();
}
}
}
After adding the content to your "BurpExtender" class you are ready to run the project for the first time. Click on "Run->Run" from the menu. You should see the following dialog asking how it should run your project:
Select "Java Application" and click "Ok". Next you should receive a dialog asking which application you want to run. Select "StartBurp - burp" and click "Ok":
When you click the "Hello World." menu button you should see some information about the request in your eclipse console window:
That's it, you now have setup your working development environment for building your own Burp extensions. The javadocs for the Burp Extender interfaces are available on the Extender web page:
- http://portswigger.net/burp/extender/burp/IBurpExtender.html
- http://portswigger.net/burp/extender/burp/IBurpExtenderCallbacks.html
- http://portswigger.net/burp/extender/burp/IHttpRequestResponse.html
- http://portswigger.net/burp/extender/burp/IScanIssue.html
- http://portswigger.net/burp/extender/burp/IScanQueueItem.html
- http://portswigger.net/burp/extender/burp/IMenuItemHandler.html
More information
CSRF Referer Header Strip
Intro
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
Solutions for Referer header strip
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
Thursday, May 21, 2020
Trendnet Cameras - I Always Feel Like Somebody'S Watching Me.
Device info page confirming firmware version |
binwalk FW_TV-IP110W_1.1.0-104_20110325_r1006.pck
DECIMAL HEX DESCRIPTION
-------------------------------------------------------------------------------------------------------
32320 0x7E40 gzip compressed data, from Unix, last modified: Thu Mar 24 22:59:08 2011, max compression
679136 0xA5CE0 gzip compressed data, was "rootfs", from Unix, last modified: Thu Mar 24 22:59:09 2011, max compression
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=1_unk bs=1 count=32320
32320+0 records in
32320+0 records out
32320 bytes (32 kB) copied, 0.167867 s, 193 kB/s
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=2 bs=1 skip=32320 count=646816
646816+0 records in
646816+0 records out
646816 bytes (647 kB) copied, 2.87656 s, 225 kB/s
#dd if=FW_TV-IP110W_1.1.0-104_20110325_r1006.pck of=3 bs=1 skip=679136
2008256+0 records in
2008256+0 records out
2008256 bytes (2.0 MB) copied, 8.84203 s, 227 kB/s
#file 3
3: gzip compressed data, was "rootfs", from Unix, last modified: Thu Mar 24 22:59:09 2011, max compression
#cp 3 3z.gz
#gunzip 3z.gz
gzip: 3z.gz: decompression OK, trailing garbage ignored
#file 3z
3z: Minix filesystem, 30 char names
#mkdir cameraFS
#sudo mount -o loop -t minix 3z cameraFS/
#cd cameraFS/
#ls
bin dev etc lib linuxrc mnt proc sbin server tmp usr var
#cd server/cgi-bin/anony/
#ls
jpgview.htm mjpeg.cgi mjpg.cgi view2.cgi
video stream. giving no fucks. |
Users configured with passwords. |
HTTP Auth with 'netcam' realm |
9,500 results |
creepy hole in the wall |
front doors to some business |
def search(self, query,page=1):
"""Search the SHODAN database.
Arguments:
query -- search query; identical syntax to the website
page -- page number of results
Returns:
A dictionary with 3 main items: matches, countries and total.
Visit the website for more detailed information.
"""
return self._request('search', {'q': query,'page':page})
Update: We are in no way associated with the @TRENDnetExposed twitter account.
Related articles
PHASES OF HACKING
Hacking is broken up into six phases:The more you get close to all phases,the more stealth will be your attack.
1-Reconnaissance-This is the primary phase of hacking where hacker tries to collect as much as information as possible about the target.It includes identifying the target,domain name registration records of the target, mail server records,DNS records.The tools that are widely used in the process is NMAP,Hping,Maltego, and Google Dorks.
2-Scanning-This makes up the base of hacking! This is where planning for attack actually begins! The tools used in this process are Nessus,Nexpose,and NMAP. After reconnaissance the attacker scans the target for services running,open ports,firewall detection,finding out vulnerabilities,operating system detection.
3-Gaining Access-In this process the attacker executes the attack based on vulnerabilities which were identified during scanning! After the successful, he get access to the target network or enter in to the system.The primary tools that is used in this process is Metasploit.
4-Maintaining Access-It is the process where the hacker has already gained access in to a system. After gaining access the hacker, the hacker installs some backdoors in order to enter in to the system when he needs access in this owned system in future. Metasploit is the preffered toll in this process.
5-Clearning track or Covering track-To avoid getting traced and caught,hacker clears all the tracks by clearing all kinds of logs and deleted the uploaded backdoor and anything in this process related stuff which may later reflect his presence!
6-Reporting-Reporting is the last step of finishing the ethical hacking process.Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used,the success rate,vulnerabilities found,and the exploit process.
Thank You To Volunteers And Board Members That Worked BlackHat Booth 2019
Also, take a moment to thank Global Board Members Martin Knobloch, Owen Pendlebury, and Gary Robinson for also working the booth and speaking with individuals and groups to answer questions on projects and suggestions on the use of our tools to address their work problems.
OWASP can not exist without support from our members.
More information
Wednesday, May 20, 2020
Files Download Information
After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account.
It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with Google and Mediafire.
Mediafire suspended public access to Contagio account.
The file hosting will be moved.
If you need any files now, email me the posted Mediafire links (address in profile) and I will pull out the files and share via other methods.
P.S. I have not been able to resolve "yet" because it just happened today, not because they refuse to help. I don't want to affect Mediafire safety reputation and most likely will have to move out this time.
The main challenge is not to find hosting, it is not difficult and I can pay for it, but the effort move all files and fix the existing links on the Blogpost, and there are many. I planned to move out long time ago but did not have time for it. If anyone can suggest how to change all Blogspot links in bulk, I will be happy.
P.P.S. Feb. 24 - The files will be moved to a Dropbox Business account and shared from there (Dropbox team confirmed they can host it )
The transition will take some time, so email me links to what you need.
Thank you all
M
Security Surprises On Firefox Quantum
This means two things
1) the owner of that site might spread malware infecting many many people.
2) the ISP also might do that.
Ubuntu Version:
Firefox Quantum version:
The URL: hxxp://ciscobinary.openh264.org/openh264-linux64-0410d336bb748149a4f560eb6108090f078254b1.zip
The zip contains these two files:
3f201a8984d6d765bc81966842294611 libgmpopenh264.so
44aef3cd6b755fa5f6968725b67fd3b8 gmpopenh264.info
The info file:
Name: gmpopenh264
Description: GMP Plugin for OpenH264.
Version: 1.6.0
APIs: encode-video[h264], decode-video[h264]
So there is a remote codec loading system that is unsigned and unencrypted, I think is good to be aware of it.
More info
Tuesday, May 19, 2020
April 2019 Connector
|
|