Angel's Posting's

Topics covering the globalist psychopaths, eugenics, paedophilia, secret societies and the plan for a new world order.
User avatar
Angel
Posts: 3729
Joined: Mon May 11, 2020 6:25 pm
Been thanked: 405 times

Re: Angel's Posting's

Post by Angel »

Image
I Love Corona ❤️

So have a good time...

Love Angel ❤️

https://dai.ly/x3nks2x

Previous thread here: viewtopic.php?f=23&t=1687
User avatar
Angel
Posts: 3729
Joined: Mon May 11, 2020 6:25 pm
Been thanked: 405 times

Re: Angel's Posting's

Post by Angel »

One of the Most Deleted Documentaries on COVID

De meest verwijderde docu van het moment! Corona op zoek naar de Waarheid…

English Subtitles

Video

https://www.blckbx.tv/videos/de-meest-v ... Gdv2R4RXmw

Timeline of Video

https://i.rmbl.ws/s8/11/R/0/e/R/R0eRb.cfCwZd.1.vtt
I Love Corona ❤️

So have a good time...

Love Angel ❤️

https://dai.ly/x3nks2x

Previous thread here: viewtopic.php?f=23&t=1687
madcamqld
Posts: 44
Joined: Sun Jan 10, 2021 2:10 am
Has thanked: 95 times
Been thanked: 20 times

Re: Angel's Posting's

Post by madcamqld »

One of the best Documentaries on COVID
Thank you Angel.
How is being "non-binary" going to help us merge with the internet of things?
User avatar
Angel
Posts: 3729
Joined: Mon May 11, 2020 6:25 pm
Been thanked: 405 times

Re: Angel's Posting's

Post by Angel »

CVE-2021-31166 – Wormable

Image

This most concerning critical bug for researchers is an HTTP protocol-stack issue that would allow RCE with kernel privileges or a denial-of-service (DoS) attack. The HTTP protocol stack enables Windows and applications to communicate with other devices; it can be run standalone or in conjunction with Internet Information Services (IIS).

“If exploited, this vulnerability could enable an unauthenticated attacker to send a specially crafted packet to a targeted server utilizing the HTTP protocol stack (http.sys) to process packets and ultimately, execute arbitrary code, and take control of the affected system,” Eric Feldman, cybersecurity researcher with Automox, wrote in an analysis.

https://blog.automox.com/automox-expert ... esday-2021

Worse, Microsoft noted that the bug is wormable, so that it could be used to self-replicate across the internal network and affect internal services that may not have been exposed.

“The vulnerability announced has the potential to be both directly impactful and is also exceptionally simple to exploit, leading to a remote and unauthenticated DoS (Blue Screen of Death) for affected products,” Steve Povolny, head of advanced threat research and principle engineer at McAfee, said via email. “While this vulnerability has the potential to lead to code execution in the Windows kernel, this type of weaponization is a much higher bar for exploitation. However, if RCE can be achieved, cybercriminals would likely have the capability to create a worm, leading to self-propagation of the vulnerability across networks and the internet.”

“For ransomware operators, this kind of vulnerability is a prime target for exploitation,” Kevin Breen, director of cyber-threat research at Immersive Labs, told Threatpost. “Wormable exploits should always be a high priority, especially if they are for services that are designed to be public facing. As this specific exploit would not require any form of authentication, it’s even more appealing for attackers, and any organization using HTTP.sys protocol stack should prioritize this patch.”

Dustin Childs, researcher with Trend Micro’s Zero Day Initiative (ZDI), noted in a blog, “Before you pass this aside, Windows 10 can also be configured as a web server, so it is impacted as well. Definitely put this on the top of your test-and-deploy list.”

CVE-2021-26419

This second critical bug affecting Microsoft’s legacy browser allows RCE, and offers several avenues of attack, according to researchers.

“In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website,” explained Feldman. “An attacker could also embed an ActiveX control marked ‘safe for initialization’ in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.”

The best way to counteract this bug is ditching IE, noted Breen.

“Internet Explorer needs to die – and I’m not the only one that thinks so,” he told Threatpost. “If you are an organization that has to provide IE11 to support legacy applications, consider enforcing a policy on the users that restricts the domains that can be accessed by IE11 to only those legacy applications. All other web browsing should be performed with a supported browser.”

CVE-2021-31194

The third critical bug exists in the Microsoft Windows OLE Automation, which in and of itself should place it on the priority-patch list, according to researchers.

“To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke OLE automation through a web browser,” explained Justin Knapp, Automox researcher. “However, this approach requires that the attacker bait a user into visiting the maliciously crafted website.”

He pointed out that OLE technology has frequently been used to mask malicious code within documents and for linking to external files that infect systems with malware.

“In 2020, the CISA released an alert detailing the top 10 routinely exploited vulnerabilities, which identified Microsoft’s OLE as the most commonly exploited technology by state-sponsored cyber-actors,” he said. “Considering the prevalent exploitation of OLE vulnerabilities, including those that had been flagged years ago, organizations should immediately prioritize patching all outstanding OLE vulnerabilities.”

CVE-2021-28476

The last critical bug is found in Windows Hyper-V, which is a native hypervisor that can create and run virtual machines on x86-64 systems running Windows. It can allow an attacker to execute arbitrary code, Knapp said: “To exploit this vulnerability, an attacker could run a specially crafted application on a Hyper-V guest that could cause the Hyper-V host operating system to execute arbitrary code when it fails to properly validate vSMB packet data. Successful exploitation could enable an attacker to run malicious binaries on Hyper-V virtual machines or execute arbitrary code on the host system itself.”

That said, Microsoft noted that an attacker is more likely to abuse the bug for DoS attacks in the form of a system crash rather than RCE, Childs pointed out, which mitigates the vulnerability’s CVSS score of 9.9.

“Because of this, it could be argued that the attack complexity would be high, which changes the CVSS rating to 8.5,” he said. “That still rates as high-severity, but not critical. Still, the bug check [system crash] alone is worth making sure your Hyper-V systems get this update.”

Publicly Disclosed Vulnerabilities

Chris Goettl, senior director of product management at Ivanti, told Threatpost that the biggest patching priority should be the publicly disclosed bugs – even though there is as yet no known malicious exploitation.

“The top concern from the Microsoft updates this month is the update for Microsoft Exchange that includes the fix for CVE-2021-31207, which made its debut in the 2021 Pwn2Own competition,” he said.

The bug tracked as CVE-2021-31207 is only rated as “moderate,” but the “security feature-bypass exploit was showcased prominently in the Pwn2Own contest and at some point details of the exploit will be published,” Goettl explained. “At that point threat actors will be able to take advantage of the vulnerability if they have not already begun attempting to reverse engineer an exploit.”

There two other publicly disclosed vulnerabilities resolved by Microsoft this month that exist in Common Utilities, found in the NNI open-source toolkit (CVE-2021-31200), and in .NET and Visual Studio (CVE-2021-31204).

“Common Utilities and .NET and Visual Studio are less likely to be targeted, but due to the public disclosures they should not be ignored for long,” Goettl added.

Other Notable Microsoft Security Patches for May 2021

As for the other patches in the update that stood out to the research community, ZDI’s Childs highlighted a Windows wireless networking information-disclosure bug, tracked as CVE-2020-24587.

“The ZDI doesn’t normally highlight info disclosure bugs, but this one has the potential to be pretty damaging,” Childs said. “This patch fixes a vulnerability that could allow an attacker to disclose the contents of encrypted wireless packets on an affected system. It’s not clear what the range on such an attack would be, but you should assume some proximity is needed. You’ll also note this CVE is from 2020, which could indicate Microsoft has been working on this fix for some time.”

Windows Graphics, SharePoint Server Patches

A trio of local privilege escalation flaws – two in the Windows Graphics Component (CVE-2021-31188, CVE-2021-31170) and one in SharePoint Server (CVE-2021-28474) – caught Breen’s eye.

As for the first two, he noted they could be chained with another bug, such as the wormable bug listed above, to become highly dangerous and allow for WannaCry-style attacks.

“This kind of vulnerability is often used by attackers after they have already gained a foothold through an initial infection vector, like phishing or via another exploit like the RCE in HTTP.sys (CVE-2021-31166),” Breen noted via email. “The attackers are looking to increase their privileges so they can move laterally across a network or gain access to other accounts that may have access to more sensitive information.”

Meanwhile, the SharePoint bug allows an authenticated attacker to run code on remote SharePoint Servers.

“As this is post-authentication, it’s likely to be used as part of post-exploitation and lateral movement phases of an attack, rather than the initial-infection vector,” Breen said. “Attackers could gain access to sensitive documents or even replace real documents with weaponized versions, enabling the compromise of more user devices across the organization’s network.”

Microsoft Exchange Server Patches

Microsoft also patched four vulnerabilities in Microsoft Exchange Server. The flaws (CVE-2021-31198, RCE; CVE-2021-31207, spoofing; CVE-2021-31209, security bypass; and CVE-2021-31195, RCE), are all rated important or moderate.

“CVE-2021-31195 is attributed to Orange Tsai of the DEVCORE research team, who was responsible for disclosing the ProxyLogon Exchange Server vulnerabilities that [were] patched in an out-of-band release back in March,” Satnam Narang, staff research engineer with Tenable, told Threatpost. “While none of these flaws are deemed critical in nature, it is a reminder that researchers and attackers are still looking closely at Exchange Server for additional vulnerabilities, so organizations that have yet to update their systems should do so as soon as possible.”

And finally, Ivanti’s Goettl noted that several Microsoft products have reached end-of-life and won’t be getting support going forward.

“This month marks the final update for several Windows 10 and Server editions, so make sure you have updated any systems to newer branches to avoid a disruption in security update coverage come June,” he said. “Windows 10 1803 and 1809 and Server 1909 all received their final update on May Patch Tuesday 2021.”

https://threatpost.com/wormable-windows ... ce/166057/

Image



Angel is busy busy preparing, are you?
I Love Corona ❤️

So have a good time...

Love Angel ❤️

https://dai.ly/x3nks2x

Previous thread here: viewtopic.php?f=23&t=1687
User avatar
Angel
Posts: 3729
Joined: Mon May 11, 2020 6:25 pm
Been thanked: 405 times

Re: Angel's Posting's

Post by Angel »

WEF CYBERPOLYGON - "NEXT CRISIS BIGGER THAN COVID" - CYBERPANDEMIC

I Love Corona ❤️

So have a good time...

Love Angel ❤️

https://dai.ly/x3nks2x

Previous thread here: viewtopic.php?f=23&t=1687
User avatar
Angel
Posts: 3729
Joined: Mon May 11, 2020 6:25 pm
Been thanked: 405 times

Re: Angel's Posting's

Post by Angel »

Father Altman Homily 05.23.2021 - I Am Not Afraid

Last edited by Angel on Sun Jun 06, 2021 3:25 am, edited 1 time in total.
I Love Corona ❤️

So have a good time...

Love Angel ❤️

https://dai.ly/x3nks2x

Previous thread here: viewtopic.php?f=23&t=1687
User avatar
Angel
Posts: 3729
Joined: Mon May 11, 2020 6:25 pm
Been thanked: 405 times

Re: Angel's Posting's

Post by Angel »

Understanding the Roman Catholic ‘state of grace’


Image


The word ‘grace’ is a simple word; it means getting something good that you don’t deserve. You experience grace when someone gives you a gift. Grace is not something you earnt or worked for; it was simply given to you by someone who loves and cares for you. The concept of grace is at the heart of what it means to be a Christian.

Yet words can sometimes mean entirely different things to different people. The word “grace”, when heard by someone who has grown up in the Roman Catholic Church, is understood to mean something entirely different, and rather more complicated, than when it is heard by someone used to the kind of definition I gave in the last paragraph.

In Roman Catholic doctrine, when Jesus died and rose again, he won a storehouse of grace for his people. This storehouse of grace is distributed to believers through the ministry of the priests. As you take part in the sacraments, you receive grace from the storehouse Jesus won.

Now, that’s quite different from the simple Biblical description of grace. That’s because this doctrine is not only derived from the Bible, but it is the result of various scholars and Popes over the centuries adding to the simple Biblical teaching.

Related to this ‘storehouse of grace’ idea is the concept of a ‘state of grace’. The Roman Catholic doctrine is that we are born sinful, but when we are baptised in the church, we have our sins washed away and enter into a state of grace. That means that if we were to die after being baptised, we would be OK with God. Baptism is not seen as permanently removing your sin, however. As you continue to sin, you can drop out of a state of grace and be under God’s judgement once more. You return to a state of grace by going to confession, doing whatever penance is necessary, and then regularly taking part in the mass. All of these are seen as sacraments; all of them are ways in which you receive grace from the storehouse Jesus won through the priests and the sacraments. Just before you die, ideally you would receive the last rites (seen as another sacrament) which would return you to a state of grace before you stand before God.

This means, in practice, that a committed Roman Catholic would need to attend mass consistently, regularly go to confession, and even then they might be worried that they are not in a state of grace. How much is enough? The result can be a sense of duty and religion and not a lot of joy in what Jesus has done. The focus shifts from what Jesus has done to all the sacraments and religious duty you have to do to be OK with God.

Grace should be simpler than that. Jesus died for your sins if you trust in Him. This is a gift you receive by the kindness of God (Eph 2:4). There is no middle man. You don’t need to take the sacraments to remain in a state of grace. It is all to do with what God has done for you in Jesus, not what you do through your religion. What Jesus won for us is applied to our hearts by the work of the Holy Spirit, not a priest.

Understanding grace is a freeing thing. If we know that it is all about what God has done, and not what we do, that means we should be joyful. We should be confident about our status before God because it cannot be ruined by our lack of religion or our mistakes. We should want to be involved in church as a response to Jesus’ work, not to remain in God’s good books. Grace, rightly understood, will truly change your life.

Theology
I Love Corona ❤️

So have a good time...

Love Angel ❤️

https://dai.ly/x3nks2x

Previous thread here: viewtopic.php?f=23&t=1687
User avatar
Angel
Posts: 3729
Joined: Mon May 11, 2020 6:25 pm
Been thanked: 405 times

Re: Angel's Posting's

Post by Angel »

FireShot Pro Webpage Screenshot #204 - 'WATCH_ Fr. Altman Asked to Resign, But Has Refused and Will Fight – Complicit Cler_' - www.complicitclergy (2).png
FireShot Pro Webpage Screenshot #204 - 'WATCH_ Fr. Altman Asked to Resign, But Has Refused and Will Fight – Complicit Cler_' - www.complicitclergy (2).png (308.61 KiB) Viewed 653 times


https://www.complicitclergy.com/2021/05 ... ill-fight/
I Love Corona ❤️

So have a good time...

Love Angel ❤️

https://dai.ly/x3nks2x

Previous thread here: viewtopic.php?f=23&t=1687
User avatar
Angel
Posts: 3729
Joined: Mon May 11, 2020 6:25 pm
Been thanked: 405 times

Re: Angel's Posting's

Post by Angel »

Fr. Altman: Catholic Church infiltrated by left-wing ideologues

I Love Corona ❤️

So have a good time...

Love Angel ❤️

https://dai.ly/x3nks2x

Previous thread here: viewtopic.php?f=23&t=1687
fren
Posts: 24
Joined: Mon May 17, 2021 1:18 pm
Has thanked: 43 times
Been thanked: 15 times

Re: Angel's Posting's

Post by fren »

thank you for all your informative posts.
Post Reply