Thứ Tư, 26 tháng 4, 2017

Waching daily Apr 27 2017

WELCOME TO SIG OFFICIAL

HOW TO MEDITATE IS NEXT VIDEO

For more infomation >> DO MEDITATION REALLY WORK AND WHAT IT DID TO MY LIFE - Duration: 18:42.

-------------------------------------------

HUMAN RELATIONS WITH PYRAMID - PART 5 - Duration: 3:57.

Welcome back, ladies and gentleman.

I have explained how

every structure or process system that exists in every element

were back to how we understand the process we called pyramid.

So,

pyramid is a code that is given to this shape.

The ancients have stated its name as pyramid so we accepted it also as pyramid.

But actually it presented the specified formulas

in human's life.

I have explained in the previous video how we can apply the benefits from these formulas.

So here's the example,

in the medical courses too.

How we want to understand it

on how our body system works.

How every cell grows.

How it is related towards each other.

Hence we could unravel it if we could find a clarified process for the formula that is in the pyramid.

So why K24?

What is K24?

I have explained from the start.

K is a factor, specified.

It has no change.

It has to be one.

So K is where everything starts with one.

2 is everything that exists in the universe in the law of Z.

It comes in pair.

Hence that is why it is 2.

Everything has its partner.

If it has no partner, we could not unravel the issue of pyramid.

And about 4,

when we look at the shape of a pyramid, it has four corners between each other,

but it has more unique features, ladies and gentlemen.

The shape of pyramid that I'm showing here is just its base.

Actually every degree that existed in a pyramid

there are 52 degrees,

there are 51 degrees,

There are varieties of pyramid in this world, if we look at the existing pyramid.

Actually they have their own role.

For the 52 pyramid

actually it was built with 52 degrees.

What for?

51 was built.

What for?

Everything has its reason.

And I will share with all of you.

Just basically because everything will take a lot of time.

But basically how does the process works.

So as a scientist,

as a scholar.

Let us together understand this.

Maybe and for sure I could open another space

for exploring and understanding the science of pyramid

and from here could know clearly what is ALAMTOLOGI.

We will continue after this.

For more infomation >> HUMAN RELATIONS WITH PYRAMID - PART 5 - Duration: 3:57.

-------------------------------------------

What is Magic League - Duration: 9:34.

What is Magic League

If you really like the fun and excitement of a prerelease, I have a format for you.

It's Magic League.

And I'll tell you all about it, right now.

Welcome Young Mage I'm The Rhino.

Young Mage is devoted to reaching and teaching young mages of all ages.

Subscribe now to show your support.

And don't forget to tap that bell down below to get notifications of all the cool stuff

coming soon.

Man, Friday Night Magic is fun.

I really like building new and different decks.

But some people just play the same deck over and over.

It'd be great if there was a format that was like the prerelease.

We always have so much fun at those.

"I Pharaoh say, why not try Magic League"

Magic League?

What's that.

V "It's a new in store format that's dynamic and fast paced."

How do I start?

"You start with 3 booster packs…

And build a 30 card deck."

"Each week you add another booster pack to your pool."

Wow, this is great.

I have so many questions.

"For that you need to call an expert."

Ok.

What is Magic League?

 Do you only play in a store or can you play at home? 

 Do you only use packs from Amonkhet or can you use other other sets like Kaladesh? 

 Can you use the same deck in more than one league? 

 Does your minimum deck size change as you add more packs? 

 What happens if somebody starts partway through the league? 

 How many games do you play each week? 

 Is there a winner? 

What are the prizes?

What is the unladen air speed of a swallow?

Magic League is amazing.

The games are fast paced.

And my deck gets better and better each week.

Magic

League is really fun.

Comment below and tell me what you think.

Are

you

ready to play in a Magic League?

Do you think you have

what it

takes

to win?

Make sure you click like on my videos, it helps out a lot.

Don't forget to subscribe, if you haven't already.

And there are a few things here and here that may interest you.

I have more videos coming out soon.

And until then, Rhino out.

For more infomation >> What is Magic League - Duration: 9:34.

-------------------------------------------

DEF CON 24 - Patrick Wardle - Ive got 99 Problems, but LittleSnitch aint one - Duration: 20:02.

>Um this is Patrick Wardle, we've got 99 problems but a little snitch aint one. And I

will just let him take his talk away. [Applause] >> Aloha. So let's talk about owning little

snitch. As he mentioned my name is Patrick Wardle. I worked at a bunch of Acronymed places,

currently the director of R&D at Synack. So synack does crowdsourced vulnerability

discovery with vetted security researchers. So if you are interested in getting paid to

find bugs in our customers web apps, mobile apps, IOT devices and network endpoints then check

out synack.com. Alright we only have 20 minutes so we are gonna jam through a good amount of

stuff. We are gonna start by briefly talking about what little snitch is. We are then

gonna talk about how to bypass it, how to exfiltrate data or talk to a Command and control

server without being detected by the firewall. Then i'm gonna talk about reverse engineering

the kernel component looking for a security vulnerability and then talk about a bug that I

found. Now before attacking any technology it's good to have basic understanding, so let's

briefly talk about what little snitch is. So what is little snitch? Well little snitch is

basically a firewall. Basically its goal is to alert the user if its sees any unauthorized

traffic. So this couple be a piece of malware, connecting to a command and control centre or

an attacker trying to exfiltrate data. It has various components. There is a kernel driver or a

kernel extension that runs in ring 0, and we are going to be focusing mostly on this, because

this is where the security vulnerability I found lies. There's also some pieces that

run in user mode, so there is a daemon that runs in the root session that does some rules

managment, and then there is some interactive components that run in the user session. Most

notably there is a launch agent that is responsible for displaying the alert anytime the

firewall core detects unauthorized traffic. So it's gonna pop up telling the user

process x is trying to connect to IP address y, then the user can confirm or deny it. Alright

so little snitch is a firewall, so how can we bypass it. That is to say how can we exfiltrate

data without being detected or connect to a command and control server without generating any

popups which would alert the user to what we are doing. So the first thing is, let's look

at the little snitches' firewall rules. What is this, there is a default undeletable system rule

that says anyone can talk to Icloud. So what we can do is reverse engineer the iCloud

protocol, and its pretty basic, its JSON based. And once we understand the protocol what we

can do is set up a Command and control server on iCloud then we can write our custom code that's

trying to exfiltrate data or write some malware that connects to a Command and control server

that is then on iCloud. Now little snitch will see this traffic but since it conforms to

that rule, it won't generate an alert. So basically now we can exfiltrate data, talk to Command

and control server without alerting the user at all. Another way to bypass little

snitch is by abusing its process level trust. So little snitch in terms of granularity, assigns

trust at the process level. This means the process is allowed to talk to the internet,a ny code

or threads of dynamic libraries within that process, can talk to the internet as well. So this

means if we can find any way to inject malicious code into any of the processes that little

snitch trusts or allows to talk to the internet, we can connect out without the user being

alerted. So for example on my box gpg keychain is allowed to talk to the internet, which

makes sense. It does key management, checks for updates, stuff like that. Fortunately gpg

keychain is vulnerable to a dialling hijack attack. This means we can plant a malicious

dynamic library on the filesystem and then every time this application is started,

either by the user or programmatically by some malware in the background, the dynamic

library will be loaded automatically by the OS loader into context. Into the process

context of this trusted application. At that point we can then connect out to the

internet. Again little snitch will see this connection, but since it conforms to a rule it

will allow it without alerting the user. Finally another way to bypass little snitch is to

simply turn it off. So I reverse engineered what happens when the user clicks on stop network

filter. And basically what happens is the user mode component of the firewall

connects and authenticates to the kernel component and we will talk about how to do that in a

minute. But once it's connected and authenticated it simply invokes method B. Method B takes

a single parameter, a 0 to turn off the firewall, or a 1 to turn it on. So we can write our own

code to do this ourselves. So the best part about this bypass is, is it's invisible to the UI.

so if malware invokes method B with a 0 to turn off the firewall to exfiltrate data and

then connect to a command and control server. If the user looks at the status of the

firewall it will show that it is on. Alright so let's talk about how to reverse engineer little

snitch. Specifically its kernel extension. With the goal of finding a exploitable a kernel

vulnerability. Bypassing a firewall, bypassing any security product is you know pretty easy.

You target a certain anti-virus product you target a certain firewall you are going to be

able to get around it. Little snitch makes it really easy, but still they should not have

exploitable security bugs. Right these are security tools. So in my opinion that's kinda what we

want to find, because that a lot bigger of a problem. So little snitch kernel extension lives in

slash library slash extensions. its signed and its started automatically every time the

system starts. We look at its info dot plist file which has characteristics about it. We can

see it's a IOkit driver. So what is IOkit? IOkit is basically apple's device driver

environment. So it's a object oriented programming model that's implemented in a subset

of C++. And there is a lot of good resources on it, so I am not gonna spend a lot of time

talking about details, but on the slide we can see this is a skeleton hello world driver.

Basically you implement a bunch of C++ methods, you compile this, load it into the kernel,

and then the kernel proper will invoke these methods. SO we can see for example invokes you know

init, proc, start, and obviously you can put code in these methods to do whatever you want

your driver to do. Now in terms of reversing specifically looking for exploitable kernel

vulnerabilities I always like to see how and where user mode data is processed. The idea here is

if we can pass in user mode date code to the kernel mode driver and it processes it in a

vulnerable way we might be able to find a security vulnerability. So it's important

to understand what mechanisms IOkit provides to pass in user mode data that's processed by an

IOkit driver. So as the slide shows there's a variety of mechanisms, we are only going to

focus on sending control requests. Because this is what little snitch does and this is

also the mechanism where you pass larger structures that might have pointers, sizes,

interesting things that the kernel driver might not validate or use correctly. So first let's

kinda talk about a conceptual overview of how a user can invoke a method in the kernel

driver. So in this slide we see at the bottom there's a user or some user mode, and say it wants

invoke a method for example: method 1. How does it do this, well it makes a request to the

kernel with a selector. A selector is simply an integer and as we will see its an index.

So this request gets routed into the kernel and then the kernel proper will forward to the

correct IOKit driver. Specifically it will call that IOkit driver's external method

function. What the external method function does is use the selector that integer as an

index into array of function pointer. These are the methods that the driver exports or

exposed to user mode. So if we want to invoke method 1, we pass in 1. So once the external

method has extracted that function pointer, calls it the dispatch method, it invokes its

super class. The super class performs some basic validation, uhh and for example if method 1

picks a strucutre of size x, and makes sure the user also passed in a structure, and that

structure they passed in is of size x.Now it doenst validate whats in that strucutre and we

will see in a minute thats kinds of a problem. Now once that parameter validation is

successful, the super class then will directly invoke the dispatch method. So will then

actually invoke method 1. So here's an example of some user mode code of how to actually do

this. So there's basically 3 steps. Step one is you use find the driver you want to connect

to and you do this by the driver's name. You then connect to it to create connection

object and then finally you invoke the method. Um and there is a bunch of api how you invoke

the um kernel mode method. In this example we are passing in a structure so we call the IO

connect call structure method. This again gets routed into the kernel, the kernel will invoke

the external method of the driver, that will validate the parameters and the call the

function that the selector indicated. Okay so let's get back to little snitch and talk

about how to connect to its IOkit driver and then how to enumerate the methods and then

audit them. So if we reverse engineer the user mode components, specifically the

user mode daemon of little snitch we can see it connecting to the little snitch driver via

the string at_obdev_lsnke. So what we can do is write our own custom code that tries to

connect to that kernel extension as well. And when we compile and run that, low and behold we are

allowed to connect to the kernel extension. So what dispatch methods can we call, that is to

say what methods does the little snitch kernel driver export or expose that we can invoke from

user mode. So if we reverse engineer the external method of the little snitch IOkit driver,

we can see where it uses that selector. And in the disassembly you can see there is an array of

function pointers called s method that IDA pro has flagged. So we double click on that and

follow the cross reference we can see there are all the methods that we can invoke, you

just invoked. So there is 17 of them or so. So I started auditing these methods cause

again these are the methods we can reach from user mode. And when I got to method 7 I found

an interesting bug. So method 7 calls a bunch of helper functions and one of these

helper functions processes the data that gets passed in from user mode. So what method 7 is

trying to do is simply copy some bytes from user mode into kernel mode. So it takes a structure

that has a size of these bytes and then the user mode address of where to copy from. Now if

you look at the pseudo code it's probably easiest to see unless you prefer to read assembly. But

you can see it extracts the size out of the user mode structure, allocates a buffer, and then if

that allocation is successful it copies the data of that same size into the kernel. So you

might look at this and took me a while and I didn't really see that there was a problem and

this looked like normal valid code. Well the problem is size matters. Why? Well the

allocation function they use which is OS_malloc takes a 32 bit integer. Well the copy

function which is copy_in takes a 64 bit integer. So obviously if you pass in a 64 bit size,

which is what little snitch extracts from that structure it's gonna truncate that when it

allocates it. So for example if we pass in one with a bunch of zeros and a two, basically 64bit

value, it's actually gonna truncate that when it goes to allocate that. So in this case

it's going to only allocate a buffer of 2 bytes. Then when it goes to the copy, copy_in uses

the entire 64 bit value. There is no truncation that occurs. So obviously we get a massive heap

overflow, because it tries to copy some 2 to the 31 or 4 billion bytes into that. Alright

so can we exploit this bug? Well turns out first before the vulnerable there is actually a

check in the little snitch driver. And what the check does it checks some value which turns

out to be a authentication flag and if that is not set to 1 it fails, it does not even invoke

the buggy code. So we have to figure out how to set the flag so we can reach the buggy code.

So I reverse engineered the remaining piece or methods in the little snitch kernel driver

and I found out that method 8 is the code that sets this flag. Basically what methods 8 does is

it's expects a hash from user mode and then it computes a secondary hash itself and then

compares these hashes. If the hashes match it sets the flag to 1. So this is exactly how we can

pass in the correct hash so that those both match , so we can set the authentication flag. So we

connect to the little snitch driver, we invoke method 4, which passes back some 16 bytes

of random data, we then hash that with md5 and a hard coded salt. The hard coded salt is

embedded in the user mode components of the little snitch firewall. An then we invoke

method 8, again method 8's gonna recompute or compute the secondary hash, and since we

know how to generate that hash, it will now match and authenticate. So it's basically

kinda like security through obscurity for authentication purposes. Okay so we can now

authenticate, but can we trigger this bug? So I found this bug in 2013 and when I was stepping

through the code in a kernel debugger I saw yes they extracted a 64 bit value, passed

that to a allocation routine that truncated that down to 32bits, so for example it would

only allocate a buffer of 2 bytes or 3 bytes. But then when I stepped over the copy routine

it actually only also copied 3 or 4 bytes. So you know that was sad, right? Did Not actually

trigger the bug. So I looked into the copy_in routine to figure out what it was doing. Um

copy_in is a function written by Apple and under the hood it calls underscore bcopy. If you

look at the assembly for underscore bcopy, it's a handwritten assembly routine.

You can see although function definition says hey I take a vm size T, which is a 64 bit value

on 64bit systems, and even the comment says I am going to use rdx which is again a 64 bit

register. You look at the assembly code they actually only ECX register. So this means that

64 value that gets passed in, that size is also gonna get truncated. So unfortunately this

at the time wasn't really a bug. Well I did what any normal person did and I filed bug

report with apple. I basically said hey guys [Laughter] your bcopy routine is [clapping] is

buggy. And we all know how Apple is, they take their time. So I had to wait 2 and a half years

for them to fix this. That's why I am only talking about it now. So they fixed it which is good,

so if you look at bcopy now and look at the assembly, you can see they correctly use RDX or

the 64 bit registers. As the function definition says it should. So awesome. So we can

authenticate and we can trigger the bug. But it's still gonna try to copy some massive amount

of bytes into a small allocated buffer. Which is gonna trash the kernel and cause a kernel panic.

So basically we need to figured out a way to how exactly control the number of bytes, so we can

maybe overflow it by 6 or 7 bytes. You know we need a tactical solution here. So how

can we take this whole kernel copy. Well turns out that bcopy is actually fault tolerant,

which is a good thing, so bcopy again is copying data from user mode into kernel mode. So what

happens if it hits an unmapped page it handles this gracefully and stops copying. So we can

exploit this fact by passing in an address that's close to a page boundary of an unmapped

page. So we can map two pages in user mode, unmap the seconds page, and then pass in pointer

that say like 5 bytes before that unmapped page, and what's gonna happen is that copy

routine is going to try and copy 4 billion bytes in, but as soon as it hits that unmapped page

it's gonna stop. So that's perfect cause now we control the exact number of bytes that are

copied. So now we have all the components needed for an exploitable heap overflow. We

control the size of an allocation buffer in the kernel. We control the values of the

bytes copied, there is no constraints. We can put in 0s, nulls, whatever we want. And

most importantly we can copy the number of bytes that get copied into this buffer. So what we can

do to exploit this, is we can perform a heap spray, some heap feng shui, and basically get a

C++ object that we own to be immediately adjacent to this little snitch buffer. We can

then overflow the little snitch buffer into that C++ object and if you know how a C++ object is

laid out in memory, it has a vtable which is a pointer to all its function pointers. So we can

corrupt that or control that vtable. And once you control the vtable of an object you control,

if you can invoke methods on that, it will use the corrupted vtable. Which basically give you

RIP. So here is a screenshot of the kernel broken on instruction, it's a call

instruction uses RAX. I've blown it up a little bigger so you can see the values. But if we look

at what RAX is, its 41 41 41 41, so basically we control the instruction pointer in kernel

mode. Now firstly we dont have the time to talk to how to weaponize this exploit, but

there's been a great number of really awesome talks articulating exactly how to do

this if you have such a heap overflow. So they talk about how to groom the heap, how to get

these C++ objects, where you need to be, how to bypass kslr, [inaudible], smap, that kind of

stuff and some payload. Now one interesting weaponization technique you can maybe use with

this, is that even if the bug patched, this is still a valuable bug. So in modern

versions of OS 10, even if you have root access, you can't bypass system integrity

protection and you can't load unsigned code into the kernel. However this is a signed driver,

so as long as we have a buggy version of this driver, we can bring this to a target, load the

driver and then exploit the vulnerability. Once we exploited it, we have arbitrary code

execution in the context of ring 0, in the kernel. Now we can bypass system integrity

protection or even run unsigned code in the kernel. Alright so let's wrap this up. So what did

the vendor do, so the good news is they fixed the bug pretty quickly. So I said hey guys you

should probably just pull out the 32 bit value and pass that to both the allocation and the

copy function, then you don't really have to care about what it's doing under the hood. So

that's exactly how they patched it. Fortunately then they really down played the bug, so the

exact quote was they fixed a rare issue that could cause a kernel panic. This is bullshit.

It's not a rare issue, this was in all versions of little snitch. Its also not a kernel

panic. it's a exploitable security vulnerability. So I was a little urked, because I was

like come one guys you are a security company. You Are providing payed security tools,

if someone reports you a security bug, at least you know like lets your users know that

they should update. So you know that was a little of a bummer, but I think they've got better.

Alright um I'M assuming you guys are interested in Mac stuff, which is why you are here. So

I'm just briefly going to mention my personal Mac security website, I apologize for the

shameless plug. But everything is free, lot of opensource Mac security tools. There's a bunch

of modern Mac malware samples if you want to reverse engineer, the AV guys don't always like to

share. So I try to share. And also I blog about this stuff, so feel free to check it out, if

not, no worries. Alright so we have 54 seconds so there's time for one or two questions, i'll

hang around afterwards if any of you want to chat. So are there any questions about little

snitch kernel exploitation? Anything else? Anything Else? [applause] That one slide. Yes

[applause] Awesome well thanks again, feel free to shoot me email any time. Ummm I love

talking about all this stuff. Um and thank you again I really appreciate you attending my

talk. [applause]

For more infomation >> DEF CON 24 - Patrick Wardle - Ive got 99 Problems, but LittleSnitch aint one - Duration: 20:02.

-------------------------------------------

NFL hopeful De'Veon Smith is product of Howland High School - Duration: 2:48.

the NFL... Doug

Datish was picked by the Falcons

in the 6th round, back in

2007... De'Veon Smith is

hoping to be NEXT. Sports

Director Ryan Allison caught up

with the Michigan tailback,

and THREE time member of our Big

22...on the eve of the NFL

Draft.

[15870]20170426 DEVEON SMITH

NFL-PK

HOWLAND GRADUATE, DE'VEON

SMITH: "THIS WHOLE

ENTIRE PROCESS HAS BEEN... I

DON'T EVEN KNOW HOW TO DESCRIBE

IT...

IT'S KIND OF SOMETHING YOU'VE

WAITED FOR YOUR WHOLE LIFE, BUT

YOU CAN'T WAIT FOR IT TO BE

OVER."

RYAN ALLISON: DE'VEON SMITH HAS

ALREADY MET AND INTERVIEWED WITH

ALL 32 NFL TEAMS... AND HE

DEFINITELY HAS A FEW

FAVORITES... BUT

GOOD LUCK GETTING IT OUT OF HIM.

DE'VEON SMITH: "NAH, I CAN'T

EVEN SAY THAT. IT'S ALL 32

TEAMS, 32

TEAMS LET ME KNOW. I ONLY NEED

ONE TEAM HONESTLY. I JUST

NEED ONE TEAM. GIVE ME A SHOT."

RYAN ALLISON: DE'VEON WILL GET

HIS SHOT THIS WEEKEND, AND WHEN

THAT MOMENT COMES...

SMITH: "I ALREADY KNOW WHAT THE

MOMENT IS GOING TO BE LIKE.

THERE'S GOING TO BE A LOT OF

TEAR SHEDDING. FOR SURE MY MOM

IS

GOING TO BE THE FIRST TO

BREAKDOWN. I'M GOING TO BREAK

DOWN TOO, ALL MY BROTHERS AND MY

LITTLE SISTER."

RYAN ALLISON: THIS ISN'T THE

FIRST TIME DE'VEON HAS BEEN

EXCITED TO

JOIN A NEW TEAM... WHEN HE

COMMITTED TO MICHIGAN 5 YEARS

AGO... HE TOLD US ABOUT A VIDEO

GAME VERSION OF HIMSELF WITH THE

WOLVERINES. SMITH: YEAH, I

ACTUALLY

CREATED MYSELF ON THE NCAA

FOOTBALL GAME. I WAS JUST SEEING

WHAT I'D LOOK LIKE IN THE MAIZE

AND BLUE, SEE WHAT KIND OF STUFF

I

WOULD WEAR, SO I HAVE IMAGINED

THAT YEAH.

NATS - "SMITH WILL RUN IT AGAIN,

AND HE SCORES."

RYAN ALLISON: "AND IF YOU'RE

WONDERING WHETHER HE'S HAD

THE SAME DIGITAL DEBUT IN MADDEN

N-F-L?

SMITH: DEFINITELY, I DEFINITELY

MADE A PLAYER, CREATED A PLAYER

TO SEE WHAT UNIFORM FIT ME THE

BEST. WHAT NUMBER WAS

AVAILABLE AND JUST HAVING FUN

WITH IT.

RYAN ALLISON: OVER THE LAST 4

YEARS IN ANN ARBOR, DE'VEON

SMITH HAS RUSHED FOR OVER 21

HUNDRED YARDS AND SCORED 22

TOUCHDOWNS... SOME OF WHICH,

WERE SPECTACULAR.

NATS - "DE'VEON SMITH BREAKS

FREE, AND SCORES"

RYAN ALLISON: BUT HIS BIGGEST

ASSET... MAY BE BLOCKING, AND

MORE IMPORTANTLY PROTECTING THE

QUARTERBACK...

AND IF YOU ASK HIM THE ADVANTAGE

HE HAS OVER EVERY OTHER BACK.

SMITH: THAT I'M THE BEST PASS

PROTECTOR IN THIS DRAFT CLASS. I

DON'T THINK THERE'S ANY PASS

PROTECTOR THAT CAN PROTECT LIKE

ME HONESTLY. I MEAN ONLY TIME

WILL TELL, GOING TO HAVE TO

PROVE

THEM WRONG. WHATEVER TEAM PICKS

ME, THERE GOING TO SEEM,

AND THE OTHER TEAMS THAT DIDN'T

For more infomation >> NFL hopeful De'Veon Smith is product of Howland High School - Duration: 2:48.

-------------------------------------------

Jason Crittenden VLOG April 26, 2017 MY WIFE IS FIRE - Duration: 4:21.

Well, I'm taking the morning off from work to help my wife.

She's doing a Lularoe show over at Dobmeier's house today, and she's gonna sell some stuff!

So I'm heading out from Alison's Lularoe pop up today.

Heading over to a client testimonial video shoot.

I was just thinking...I don't know how many of you guys know my wife, but...

DANG IS SHE PRETTY!

Awesome man!

I can't believe it.

This is one of my favorite sights right here.

Check out that smoker.

YEAH BUDDY!

Check this little girl out, she's so fast!

So, pretty stoked about this.

We are closing on a deal on Friday.

I got the pre-audit settlement statement for our seller from title yesterday and the seller

is contributing some closing costs.

The way the contract reads, it says "up to 3% of closing costs".

Not 3%...but UP TO 3%.

And, so, I...the settlement sheet had said, the number was literally 3%.

Which I knew was incorrect.

So I asked, "Hey, does this guy, the buyer, literally have this much in closing costs?"

They said "Well, let us balance with the lender and I'll get it back".

They were just sending that over...which is...whatever.

So, they sent it back over with all of the fees and I noticed they were prepaying the

buyer's HOA for an entire year!

Now that used to be legit.

They used to be able to do that.

But they changed the contract back in February.

February 1st.

And um, I got educated on it.

My team took classes to make sure we understood all of the contract changes and how it affected

our buyers and sellers.

But a lot of agents didn't.

Even some title and lenders, they don't fully understand the new contract.

So, I caught this right away.

The way the contract NOW reads is the seller contributions can ONLY, ONLY (key word) be

used for lender costs, which HOA pre-paids are not for an entire year...for pre-paid

or escrow fees, title fees, taxes, insurance, and VA if applicable.

And that's basically it.

So, they can't be used to prepay HOA for a year.

So I fought it and fought it and the agent, the lender, title, they all kind of fought

me on it until I reminded title that they have a fiduciary responsibility to all parties

equally.

Now this is buyer's title, they can't favor anybody and they know that, but...they probably

have some sort of relationship with each other.

So they fought me on it until I mentioned that and this morning I got an email that

said "Hey, you're right.

We removed it."

And it was just fantastic news for my sellers because I just saved them like $870.

So it's just awesome.

I'm just super pumped!

I'm glad that I took the time to get educated on that piece of the puzzle and I was able

to fight for my client and made sure that they win.

I just got home and I saw my daughter sleeping on the couch.

This is probably the funniest I've ever seen... she's out.

So it's the end of the night again and I just got done watching our client testimonial video

that was shot yesterday and today with Tarl Johnson and it was so neat!

He said the nicest things about me ever and it was just touching.

It was super cool.

So, today was an awesome day.

Today was a really good day.

I hope that you guys had an awesome day too and I am out!

For more infomation >> Jason Crittenden VLOG April 26, 2017 MY WIFE IS FIRE - Duration: 4:21.

-------------------------------------------

New Chinese aircraft carrier '6 times more powerful' than existing Liaoning - Duration: 1:36.

China has launched its second aircraft carrier but the first it has ever built from scratch.

It marks the latest milestone in China's superpower ambitions.

The new mega-ship is said to have six times more military strength than Beijing's existing

Liaoning.

With more on this and other news in East Asia..we turn to Ro Aram...

Aram.. the launch of this carrier shows how far China's naval know-how has come on over

the years,... let's hear the specs

Yes Mark... the Type 001A carrier weighs about 50-thousand tons which is 10-thousand tons

less than the Liaoning, but it's slightly longer.

It is powered by conventional steam turbines, which makes it slower than U.S. carriers,

but quicker than the Liaoning.

The vessel also houses a ski jump-style deck for taking off, which experts say is cheaper

to run than the catapults used by the U.S., but limits the diversity of aircrafts on board

to smaller fighter jets.

The new carrier aims to carry 36 Shenyang J-15 multirole fighter jets, which is 12 more

than what the Liaoning can carry.

After sea trials and the arrival of its full air complement, the yet-to-be-named carrier

is expected to be operational by 2020.

Although it still has some way to go to catch up with American carriers, the new ship is

part of Beijing's bigger plan to build a navy that is unrivaled in Asia...and another carrier

- the Type 002 - is reportedly under construction in Shanghai.

For more infomation >> New Chinese aircraft carrier '6 times more powerful' than existing Liaoning - Duration: 1:36.

-------------------------------------------

Youngstown's progress after steel: 'The transformation is pretty amazing' - Duration: 2:29.

And I'm Mandy Noell. The City of

Youngstown held a town hall

meeting

tonight to talk about what's

happening in the city.

Often to plan for the future...

you have to look to the past.

But we're going to focus on one

part of the meeting -- the

speech by Finance

Director Dave Bozanich. Drawing

from his years of experience --

he

explained how the city

progressed post-steel -- while

at the same time answered the

critics.

Bozanich on Youngstown is our

top story at 11.

[A9]20170426 YNG TOWN HALL 27-PK

Stan Boney-WKBN 27 first news:

Dave Bozanich started working

for the

city of Youngstown in 1980. He's

been Finance Director for 25

years. He's most

knowledgeable on how the city

works.

Dave Bozanich-Youngstown City

Finance Director:

"IF YOU LOOK BACK ON OUR HISTORY

IN TERMS OF WHERE WE WERE AT 30

YEARS AGO, AND WHERE WE'RE AT

TODAY, THE TRANFORMATION IS

PRETTY AMAZING." Stan Boney-WKBN

27 first news:

At this evening's 2nd annual

town hall meeting -- Bozanich

told how the city first

bought all of Youngstown's old

steel mill sites.

Dave Bozanich-Youngstown City

Finance Director: "WE

PROCEEDEDTO TURN THOSE FORMER

BROWNFIELD SITES INTO ECONOMIC

DEVELOPMENT OASES FOR THE CITY

OF YOUNGSTOWN." Stan Boney-WKBN

27 first news:

Those oases include industrial

parks -- that have created seven

thousand jobs and 3.5

billion dollars in investments.

Dave Bozanich-Youngstown City

Finance Director:

"YOU GO TO OUR SALT SPRINGS ROAD

SITE, WE HAVE 26 PROJECTS

THAT WE DID IN A PERIOD OF FOUR

YEARS."

Stan Boney-WKBN 27 first news:

"BOZANICH WAS ALSO CRITICAL OF

CAMPBELL AND STRUTHERS,

YOUNGSTOWN'S NEIGHBORS TO THE

SOUTH, FOR FAILING TO CONTINUE

THE DEVELOPMENT

ALONG THE MAHONING RIVER --

ALONG WHAT IS BILLED AS THE

CORRIDOR OF OPPORTUNITY."

Dave Bozanich-Youngstown City

Finance Director:

"BUT THERE IS NO ECONOMIC

DEVELOPMENT THERE. IT HAS

BEEN A CORRIDOR OF NON

OPPORTUNITY."

Stan Boney-WKBN 27 first news:

At it's meeting last night --

several school board members

were critical of city council's

constant passing of tax

abatements --

which Bozanich called a bad rap.

Dave Bozanich-Youngstown City

Finance Director:

"TAX ABATEMENTS SHOULD BE GIVEN

BY THE SCHOOL BOARD BECAUSE

THEY ARE GETTING THE LION SHARE

OF THOSE TAX ABATEMENTS OVER

A PERIOD OF TIME." Stan

Boney-WKBN 27 first news:

He talked about water. How

Youngstown -- in the 1930s --

paid for the

bulk of Meander Reservoir and

now is being criticized for

selling the water at

rates much higher than for city

residents.

Dave Bozanich-Youngstown City

Finance Director:

"SOMEBODY WANTS TO COMPLAIN, A

BOARDMAN OR AUSTINTOWN OR

CANFIELD FOR THAT MATTER. THEY

HAVE THE RIGHT TO COME IN

AND NEGOTIATE. WHEN THEY COME IN

WE SAY WE WANT PART OF

YOUR INCOME TAX FOR GIVING YOU A

LOWER WATER RATE. THEY SAY NO

THANKS AND THEY WALK OUT. THEN

WE HAVE THE RIGHT TO SET THE

WATER RATES WHERE WE SO DESIRE."

Dave Bozanich says you can't do

economic development on a small

scale. It has to

be done in a way that changes

the town. He says a little bit

is just fanfare

We have his entire speech -- all

16 minutes of it -- posted on

For more infomation >> Youngstown's progress after steel: 'The transformation is pretty amazing' - Duration: 2:29.

-------------------------------------------

Nutra Nuggets Dog Food Lamb and Rice - Duration: 2:18.

Diamond Dog Food

Nutra Nuggets Lamb Meal and Rice Formula Dog Food

Nutra Nuggets Lamb dry dog food review

hi it's AlaskaGranny I recently bought super-premium Nutra Nuggets

lamb meal and rice formula adult dog food for my little AlaskaSammy

the flavor of dry dog food I I chose from Nutra Nuggets by Diamond was lamb

meal and rice formula for adult dogs premium dog food

I like that Nutra Nuggets comes in a four pound bag

I don't want to buy a 20 or 50 pound bag

of dog food to try out on a 10 pound dog

that would be like you buying 300 pounds

of food for yourself to see if you like it

the ingredients in Nutra Nuggets are listed on the bag

the ingredients come from food grade suppliers and

are certified hormone and

antibiotic-free no artificial

preservatives are used on the Nutra Nuggets dog food

read on the bag for any dog food

that you choose and make sure it has the

AAFCO statement you want to choose a

product that contains complete nutrition

for your dog the back of the bag of Nutra Nuggets shows

you all of the omega-6 and omega-3s the

glucosamine and the chondroitin why

would you want probiotics and

antioxidants in your dog's food dogs

just like humans have good and bad

bacteria probiotics help maintain their

healthy balance by suppressing the bad

bacteria in their intestines the bag of nutra nuggets dog food is

a heavy quality plastic you can't just

pull it open like a chip bag you have to

cut it open the nuggets are small about

the size of a pea three of the dog food nuggets would

equal about the size of a penny which is

nice because my dog is small

Will my AlaskaSammy enjoy Nutra Nuggets lamb and rice dog food

yes AlaskaSammy will eat it

he loves it if you're looking for a

reasonably priced food for your dog look

for the Nutra Nuggets I paid about $4.79

4 dollars and 79 cents for a four pound

bag where I live in Alaska it may be

cheaper where you live or from another

store my dog likes nutra nuggets it's a high

quality nutritional food and it's

something that he's willing to eat happily

please subscribe to the AlaskaSammy channel

Không có nhận xét nào:

Đăng nhận xét