tag:blogger.com,1999:blog-78417685967796427872024-03-08T15:23:33.718-08:00Exploit Crew LabsUnknownnoreply@blogger.comBlogger5125tag:blogger.com,1999:blog-7841768596779642787.post-80627859105787193242009-06-04T13:31:00.000-07:002009-06-09T14:27:50.652-07:00App Web Vuln Cookie Spoofing<pre><code><?<br />/**<br />* 04/06/09<br />* App Web Vuln Code Cookie Spoofing<br />* Coded by Bocvk<br />* www.exploit-crew.blogspot.com<br />**/<br /><br />if(!empty($_POST['user']) && !empty($_POST['pass'])){<br /><br />$user=$_POST['user'];<br />$pass=$_POST['pass'];<br />check_user($user,$pass);<br /><br />}elseif(empty($_COOKIE['user'])){<br />echo '<center><br><form action="" method="POST"><br /> User : <input type="text" name="user"><br><br /> Pass : <input type="text" name="pass"><br><br><br /> <input type="submit" value="Send"><br /> </form></center> ';<br />}else{<br />if(isset($_COOKIE['user']))<br />{<br />echo "<center><h1>";<br />switch($_COOKIE['user']){<br /> case 1: echo "Logged in admin";<br /> break;<br /> case 2: echo "Logged in user1";<br /> break;<br /> default: echo "Logged in user2";<br /> break;<br /> }<br />echo "</h1></center>";<br />}<br />}<br /><br /><br /><br />function check_user($user,$pass){<br />// Simulation of database simple =)<br />$users=array("admin","user1","user2");<br />$passwords=array("pass_admin","pass_user1","pass_user2");<br /><br /> for($i=0;$i<count($users);$i++){<br /> if($users[$i]=="$user" && $passwords[$i]=="$pass"){<br /> setcookie("user",strval($i+1),time()+3600);<br /> $file= basename($_SERVER["SCRIPT_NAME"]);<br /> header("Location: $file");<br /> }<br /> }<br />}<br />?></code></pre>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7841768596779642787.post-24548388929081739712009-05-31T10:07:00.000-07:002009-05-31T10:24:36.251-07:00PHP Code AnalitycEste script lo hice por la razon , que no podia ejecutar el CGI Code Analityc de Xianur0 , porque no tenia soporte CGI , asi que creo que la mayoria no lo tiene , por lo tanto lo hice en php que es totalmente diferente el codigo , la idea la extraje del manual hecho por Xianur0 asi que de ahi me guie y de una variante de una tool que programe hace unos dias tambien , pero creo que el CGI Code Analityc solo busca los parametros en un directorio mas no en los subdirectorios , esta funcion esta agregada , aqui les dejo algunas descripcion del script :<br /><br /><b>Funcion del Script :</b><br />Busca una variable/texto/funcion en los archivos de una carpeta y subcarpetas<br /><br /><b>Utilidad :</b><br />- Encontrar fallas de seguridad<br />- Lo dejo para su imaginación<br /><br /><br /><b>Ej de utilidad :</b><br />Buscar variables globalizadas, por ejemplo $_SERVER (en PHP) logicamente $_SERVER contiene variables del servidor, pero tambien contiene algunas como son headers HTTP<br /><br /><blockquote>Path : /home/bocvk/wordpress<br />Search : $_SERVER['HTTP_<br /></blockquote>Resultado :<br /><blockquote>/home/bocvk/wordpress/wp-content/plugins/akismet/akismet.php<br /><br />Line 189:<br />$comment['user_agent'] = $_SERVER['HTTP_USER_AGENT'];</blockquote><br />Aqui podriamos sacar un LFI seria cuestion de seguir el rastro a la variable aver si no se filtra y por donde pasa tambien aver si se podra sacar el LFI ...<br /><br />Mas Info :<br /><a href="http://foro.infiernohacker.com/index.php/topic,9748.0.html" target="_blank">CGI Code Analytic v0.1 Xianur0</a><br /><a href="http://foro.infiernohacker.com/index.php/topic,9761.0.html" target="_blank">Manual CGI Code Analytic By Xianur0</a><br /><br /><span style="font-weight: bold;">Source :</span><br /><pre><code><style type=text/css><br />BODY { font: 11px Tahoma, Verdana, sans-serif;<br />margin: 0px;<br />padding: 0px;<br />text-align: center;<br />color: #000000;}<br />Table{<br />border: 1px solid #DADADA;<br />background-color: White;<br />padding: 5px;<br />font: 11px Tahoma, Verdana, sans-serif;<br />line-height: 17px;<br />color: Gray; }<br /><br />input,textarea,select<br />{<br />margin: 3px;<br />vertical-align: middle;<br />border: 1px solid #DADADA;<br />background-color: White;<br />padding: 3px;<br />font: 11px Tahoma, Verdana, sans-serif;<br />color: Gray;<br />}<br /><br />div{<br />padding: 10px;<br />width:80%;<br />border:1px dashed black;<br />}<br /><br /></style><br /><html><br /><title>PHP Code Analityc by Bocvk</title><br /><body><br /><br><table width="300" align="center"><th>PHP Code Analityc</th><br /></table><br><br /><table align="center"><br /><form action="" method="post"><br /><tr><br /><td>Path : </td><td><input type="text" name="path" size="40"></td><br /></tr><br /><tr><br /><td>Search : </td><td><input type="text" name="search" size="40"></td><br /><tr><br /><tr><br /><td></td><td><input type="submit" value="Search"></td><br /></tr><br /></form></table><br><br /><?php<br /><br />// PHP Code Analityc<br />// Coded by Bocvk<br />// bocvk [at] hotmail [dot] com<br />// ~[Expl0it-Cr3w]~ 2oo9<br /><br />// WARNING :<br />// I see not talk very good the language english<br />// Sorry if find a gramatical error<br /><br /><br />// ----- CONFIG -----<br />// route where executed the searcher<br />$path_conf=$_POST['path'];<br />// string of searcher<br />$search_conf=$_POST['search'];<br />// ----- -----<br /><br />// Check if exists parameters<br />if($path_conf=="" || $search_conf==""){<br />exit;<br />}<br /><br />$search_conf=stripslashes($search_conf);<br /><br />echo "<table align='center'><br /><tr><td>Directory :</td><td>$path_conf</td></tr><br /><tr><td>String :</td><td>".htmlentities($search_conf)."</td></tr><br /></table><br>";<br /><br /><br />function search($path){<br />global $search_conf;<br /><br />// Open Dir<br />if(!($handle=@opendir($path))){<br />echo "Error : Directory Incorrect";<br />exit;<br />}<br />// $file content the name of archives in the directory specify<br />while (false !== ($file = readdir($handle))){<br /><br />// Check is different a current directory<br />if ($file != "." && $file != ".."){<br /><br />// We put the route and name of archive for can open the archive<br />$path_full=$path."/".$file;<br /><br /><br />// Check is directory<br />if(is_dir($path_full))<br />{<br />search($path_full);<br />}else{<br /><br />// Print a error if can't open archive<br />if(!$fp=fopen($path_full,'r')){<br />echo "Error : Can't open the archive";<br />exit;<br />}<br /><br />$warning=0;<br />$line_search=array();<br />$numline_search=array();<br /><br />// Extract line for line of the archive<br />$count_lines=0;<br />while(!feof($fp)){<br />$line=fgets($fp);<br />// Searching the possibles results<br />if(strstr($line,$search_conf)){<br />$warning=1;<br />array_push($line_search,$line);<br />array_push($numline_search,$count_lines);<br />}<br />$count_lines++;<br />}<br /><br /><br />// Verify if finded a archive<br />if($warning==1){<br />// Print the filename of the archive<br />echo "<br><center><div>Archive : $path_full<br>";<br />// Print the number line and content<br />for($i=0;$i<count($numline_search);$i++){<br />echo "<br>Line ".($numline_search[$i]+1).":<br><textarea cols=150 rows=1>".htmlentities($line_search[$i]).<br />"</textarea><br>";<br />}<br />echo "</center></div><br>";<br />}<br /><br />// Closed the archive<br />fclose($fp);<br />}<br /><br />}<br />}<br /><br /><br />// Closed the directory<br />closedir($handle);<br /><br />// Closed function search<br />}<br /><br />// We invoked to the function search<br />search($path_conf);<br /><br />?></code></pre>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7841768596779642787.post-33947059272115635152009-05-26T14:06:00.000-07:002009-05-26T14:09:48.322-07:00Port Scan Simple [Perl]<pre><code>#!/usr/bin/perl<br /># 25-03-09<br /># PortScan Simple<br /># Coded by Bocvk<br /># Exploit-Crew => Bocvk , Polk<br /># Contact : info.bocvk [at] gmail.com<br /># HomePage : www.exploit-crew.blospot.com<br /><br />use IO::Socket;<br />die " [!] Syntax : perl $0 [server] [port_begin] [port_end]n" unless($ARGV[2]);<br />$server=$ARGV[0];<br />$port_i=$ARGV[1];<br />$port_f=$ARGV[2];<br />print " [+] Scanning ...n";<br />for($port=$port_i;$port<=$port_f;$port++){<br /> $socket= IO::Socket::INET->new(PeerAddr => "$server",<br /> PeerPort => "$port",<br /> Proto => 'tcp');<br /><br /> if($socket){<br /> $service = getservbyport($port, 'tcp');<br /> print " OPEN | $port | $servicen";<br /> }else{<br /> print " CLOSE | $portn";<br /> }<br />close($socket);<br />}</code></pre>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7841768596779642787.post-80041806037008584752009-05-17T10:26:00.000-07:002009-05-17T10:36:57.510-07:00Path Disclosure in Systems Web of Open Sources<div align="center"><span style="line-height: 1.3em;font-size:15;" ><b>¿Que es Full Path Disclosure?</b></span></div><br />Full Path Disclosure quiere decir divulgación de ruta completa. En palabras simple, es mostrar la ruta exacta donde nos encontramos.<br />Es una vulnerabilidad producida debido a que los reportes de error están activados en el php.ini .<br /><br /><div align="center"><span style="line-height: 1.3em;font-size:15;" ><b>Utilidades del Path Disclosure</b></span></div><br />Obtener la ruta del servidor , asi poder aplicar mejor las vulnerabilidades de :<br />*Local File Inclusion<br />*Load File con SQL Injection<br />*Otros<br /><br /><div align="center"><span style="line-height: 1.3em;font-size:15;" ><b>Encontrando Path Disclosure en Sistemas Webs de Open Source</b></span></div><b><br />Utilidades :</b><br />Hosting (Preferible un localhost)<br />Un sistema web (Ej : Joomla , Wordpress , etc)<br /><br /><b>Encontrando Path Disclosure :</b><br />*La idea es acceder a los archivos php que no muestran contenidos html sino que son funciones para otros archivos que si cumplen la funcion de mostrar el html , a traves del navegador asi las funciones no recibiran los parametros correctos y provocaran errores , tal como cuando programamos en php a la hora probar nuestros scripts a veces nos surgen algunos errores<br />los cuales contienen la sgte. informacion :<br />- Indicandonos la ruta del archivo<br />- El error especifico y el numero de linea en la cual se encuentra dicho error<br /><br />Ej :<br /><blockquote>Fatal error: Class 'JText' not found in C:\xampp\htdocs\config_database.php on line 2</blockquote><div class="quote"></div><br />*El problema esta en que algunos sistemas webs contienen protecciones en algunos archivos y en otros como por ejemplo SMF , si vos accedes a un archivo diferente de index.php a traves del navegador como /Sources/Admin.php veras el sgte mensaje de proteccion :<br /><blockquote>Hacking attempt...</blockquote><br />O tambien el problema seria que algunos sistemas webs contienen demasiados archivos , y estar revisando uno por uno seria muy molestoso ...<br /><br />*Asi que para ahorrar tiempo programe una tool en php que extrae la ruta de todos los archivos que tienen la vulnerabilidad de path disclosure .<br />La tool es la sgte :<br /><br /><pre><code><style type=text/css><br />BODY { font: 11px Tahoma, Verdana, sans-serif;<br /> margin: 0px;<br /> padding: 0px;<br /> text-align: center;<br /> color: #000000;}<br />Table{<br />border: 1px solid #DADADA;<br />background-color: White;<br />padding: 5px;<br />font: 11px Tahoma, Verdana, sans-serif;<br />line-height: 17px;<br />color: Gray; }<br /><br />input,textarea,select<br />{<br />margin: 3px;<br />vertical-align: middle;<br />border: 1px solid #DADADA;<br />background-color: White;<br />padding: 3px;<br />font: 11px Tahoma, Verdana, sans-serif;<br />color: Gray;<br />}<br /><br />div{<br />padding: 10px;<br />width:80%;<br />border:1px dashed black;<br />}<br /><br /></style><br /><html><br /><title>Tracker of Fatal Errors by Bocvk</title><br /><body><br /><br><table width="300" align="center"><th>Tracker of Fatal Errors</th><br /></table><br><br /><table align="center"><br /><form action="" method="post"><br /><tr><br /> <td>Path SystemWeb : </td><td><input type="text" name="path" size="40"></td><br /></tr><br /><tr><br /> <td>Search Not Exist : </td><td><input type="text" name="search1" size="40"></td><br /></tr><br /><tr><br /> <td>Search Yes Exist : </td><td><input type="text" name="search2" size="40"></td><br /></tr><br /><tr><br /> <td></td><td><input type="submit" value="Search"></td><br /></tr><br /></form></table><br><br /><br /><?php<br /><br />// Tracker of Fatal Errors<br />// Coded by Bocvk<br />// bocvk [at] hotmail [dot] com<br />// ~[Expl0it-Cr3w]~ 2oo9<br /><br />set_time_limit(0);<br /><br /><br />/* List all files in one folder and sub folders */<br /><br />$webs='';<br />$path_conf=stripslashes($_POST['path']);<br />$strsearch=$_POST['search1'];<br />$strsearch_new=$_POST['search2'];<br /><br />// Check if exists parameters<br />if($path_conf=="" || $strsearch=="" || $strsearch_new==""){<br />exit;<br />}<br /><br />echo "<table align='center'><br /><tr><td>Path SystemWeb:</td><td>$path_conf</td></tr><br /><tr><td>String Not Found:</td><td>".htmlentities($strsearch)."</td></tr><br /><tr><td>String Found:</td><td>".htmlentities($strsearch_new)."</td></tr><br /></table><br>";<br /><br />function list_dir($path){<br />global $webs;<br /><br />if(!($handle=@opendir($path))){<br />echo "Error : Directory Incorrect";<br />exit;<br />}<br /><br />while (false !== ($file = readdir($handle))){<br />if ($file != "." && $file != ".."){<br />$path_full=$path."/".$file;<br /> if(is_dir($path_full))<br /> {<br /> list_dir($path_full);<br /> }else{<br /> $webs.=$path_full.'?';<br /> }<br />}<br />}<br /><br />}<br /><br />list_dir($path_conf);<br /><br />/* End List Dir */<br /><br />$webs=str_replace('\','/',$webs);<br />/* Config Rute Personal */<br />$webs=str_replace('C:/xampp/htdocs','http://localhost',$webs);<br /><br /><br />$array_Webs=explode('?',$webs);<br />$array_Webs_new=array();<br /><br />for($i=0;$i<count($array_Webs);$i++){<br />if(strstr($array_Webs[$i],'.php')){<br />if($strsearch=='null'){array_push($array_Webs_new,$array_Webs[$i]);}<br />else{<br /> $content=@file_get_contents($array_Webs[$i]);<br /> if(strstr($content,$strsearch)==false)<br /> {array_push($array_Webs_new,$array_Webs[$i]);}<br /> }<br />}<br />}<br /><br />echo "<table align='center' width='600'><tr><td><center><h1>Results</h1></center></td></tr><br /><tr><td>";<br /><br />for($i=0;$i<count($array_Webs_new);$i++){<br />if($strsearch_new=='null'){echo $array_Webs_new[$i].'<br>';}<br />else{<br /> $content=@file_get_contents($array_Webs_new[$i]);<br /> if(strstr($content,$strsearch_new)==true)<br /> {<br /> echo $array_Webs_new[$i].'<br>';<br /> }<br />}<br />}<br />echo "</td></tr></table>"<br />?></code></pre><br /><b>Uso de la Tool :</b><br />Path SystemWeb : => Ruta Completa del Sistema Web<br />Search Not Exist : => Una String que no quieren que exista en los resultados . Ej : Hacking Attempt en SMF<br />Search Yes Exist : => String de Error . Ej : Fatal Error<br />*Si en cualquiera de las dos opciones (Search Not Exist o Search Yes Exist) , no se desea configurar deben poner la string : 'null' (sin comillas).<br /><br />Ej de uso de la tool :<br />Path SystemWeb : C:\xampp\htdocs\Joomla<br />Search Not Exist : null<br />Search Yes Exist : error<br /><br />Resultado :<br /><pre><code>http://localhost/Joomla/administrator/components/com_config/controllers/application.php<br />http://localhost/Joomla/administrator/components/com_config/controllers/component.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_cache.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_database.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_debug.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_ftp.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_locale.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_mail.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_metadata.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_seo.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_server.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_session.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_site.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/config_system.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/ftp.php<br />http://localhost/Joomla/administrator/components/com_config/views/application/tmpl/navigation.php<br />http://localhost/Joomla/administrator/components/com_installer/models/components.php<br />http://localhost/Joomla/administrator/components/com_installer/models/languages.php<br />http://localhost/Joomla/administrator/components/com_installer/models/modules.php<br />http://localhost/Joomla/administrator/components/com_installer/models/plugins.php<br />http://localhost/Joomla/administrator/components/com_installer/models/templates.php<br />http://localhost/Joomla/administrator/components/com_installer/views/components/tmpl/default.php<br />http://localhost/Joomla/administrator/components/com_installer/views/components/tmpl/default_item.php<br />http://localhost/Joomla/administrator/components/com_installer/views/default/tmpl/default_ftp.php<br />http://localhost/Joomla/administrator/components/com_installer/views/default/tmpl/default_message.php<br />http://localhost/Joomla/administrator/components/com_installer/views/install/tmpl/default.php<br />http://localhost/Joomla/administrator/components/com_installer/views/install/tmpl/default_form.php<br />http://localhost/Joomla/administrator/components/com_installer/views/languages/tmpl/default.php<br />http://localhost/Joomla/administrator/components/com_installer/views/languages/tmpl/default_item.php<br />http://localhost/Joomla/administrator/components/com_installer/views/modules/tmpl/default.php<br />http://localhost/Joomla/administrator/components/com_installer/views/modules/tmpl/default_item.php<br />http://localhost/Joomla/administrator/components/com_installer/views/plugins/tmpl/default.php<br />http://localhost/Joomla/administrator/components/com_installer/views/plugins/tmpl/default_item.php<br />http://localhost/Joomla/administrator/components/com_installer/views/templates/tmpl/default.php<br />http://localhost/Joomla/administrator/components/com_installer/views/templates/tmpl/default_item.php<br />http://localhost/Joomla/administrator/components/com_search/helpers/site.php<br />http://localhost/Joomla/administrator/components/com_translationsmanager/elements/fflanguages.php<br />http://localhost/Joomla/components/com_content/views/article/tmpl/pagebreak.php<br />http://localhost/Joomla/libraries/joomla/client/ldap.php<br />http://localhost/Joomla/libraries/joomla/html/html/content.php<br />http://localhost/Joomla/libraries/joomla/utilities/compat/php50x.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/Association.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/AX.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/BigMath.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/Consumer.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/DiffieHellman.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/Discover.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/DumbStore.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/Extension.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/FileStore.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/HMAC.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/MemcachedStore.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/Message.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/MySQLStore.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/Nonce.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/PAPE.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/Parse.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/PostgreSQLStore.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/Server.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/ServerRequest.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/SQLiteStore.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/SQLStore.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/SReg.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/TrustRoot.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID/URINorm.php<br />http://localhost/Joomla/libraries/openid/Auth/OpenID.php<br />http://localhost/Joomla/libraries/openid/Auth/Yadis/HTTPFetcher.php<br />http://localhost/Joomla/libraries/openid/Auth/Yadis/ParanoidHTTPFetcher.php<br />http://localhost/Joomla/libraries/openid/Auth/Yadis/PlainHTTPFetcher.php<br />http://localhost/Joomla/libraries/openid/Auth/Yadis/XRDS.php<br />http://localhost/Joomla/libraries/openid/Auth/Yadis/XRI.php<br />http://localhost/Joomla/libraries/openid/Auth/Yadis/XRIRes.php<br />http://localhost/Joomla/libraries/openid/Auth/Yadis/Yadis.php<br />http://localhost/Joomla/libraries/openid/consumer.php<br />http://localhost/Joomla/libraries/phpxmlrpc/xmlrpcs.php</code></pre><b><br />Verificando el funcionamiento de la tool :</b><br />*Accedemos a cualquiera de las rutas que nos dio . Ej:<br /><a href="http://localhost/Joomla/libraries/joomla/html/html/content.php" target="_blank"><blockquote>http://localhost/Joomla/libraries/joomla/html/html/content.php</blockquote></a><br />Resultado :<br /><blockquote>Fatal error: Class 'JLoader' not found in C:\xampp\htdocs\Joomla\libraries\joomla\html\html\content.php on line 15</blockquote><br /><br /><div align="center"><span style="line-height: 1.3em;font-size:15;" ><b>Reparando el Bug</b></span></div><br />Abrimos el archivo php.ini y modificamos el sgte. valor :<br /><br /><span style="font-weight: bold;"></span><blockquote><span style="font-weight: bold;">display_errors = On</span><br /><br /><span style="font-weight: bold;">display_errors = Off</span></blockquote><span style="font-weight: bold;"></span><br />Saludos , BocvkUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7841768596779642787.post-84880417155087127152009-05-09T15:03:00.000-07:002009-05-17T10:43:28.991-07:00Bievenidos<p><b>Exploit-Crew</b> somos un pequeño Grupo de Seguridad Informatica , en el cual nuestra prioridad es ofrecer un matenimiento y medidas de seguridad optimas para tu web.</p><br /><span style="font-weight: bold;">Contact :</span> info.bocvk [at] gmail.comUnknownnoreply@blogger.com0