SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Introduction to Web-ServerSecurity
Jitendra Kumar Patel Monday, September 28, 2015
The StoryThe Story
Once upon a time, there lived a lady, Pinky, and she owned a website and had hired a
Security Consultant to protect her website from malicious attackers.
One fine day,around 2:00 AM in the morning, she wanted to check her website and
found that the website has been HACKED. She immediately called her security guy and
told about the website getting hacked.
The poor chap was leisurely enjoying his dinner, 2:00 AM, was stumbled. He jumped off
the bed to chair and verified that the website is intact with no harm.
He conveyed the same to Pinky but after all cleaning work like browser cookie cleaning,
deleting temp files and all other thing, pinky was still getting the hacked website. On the
other hand the Security Consultant was sure that the website has not been hacked.
The story ends here :)
Moral of The StoryMoral of The Story
The story in the previous slide suffers from an attack knows as Local DNS Cache
Poisoning Attack.
The attacker has poisoned the local DNS server of the lady and hence every time she is
requesting for the ip address of her website, she was getting the fake ip address of
hacked page.
On the other hand the Security Consultant was not attacked and hence he was able to
see the real website.
For more, please follow the discussion on slide no : 22
Agenda of the day ... ?
News
Terminology
Attacks
How to secure a web server ?
What to do Next ?
NEWS
The First major cyber attack on Apple's App Store has now
been linked to CIA (Central Intelligence Agency)
The OPM Data Breach (Office of Personnel Management) is
getting even worse than we thought.
Terminology
A complex system of interconnected elements.
Web... ?
The state of being free from danger or threat.
Security... ?
Web Security... ?
Web Security, also known as “Cyber security” involves protecting
information by preventing, detecting, and responding to attacks.
A server is simply a computer program software/hardware that dispenses web
responses as they are requested.
Server... ?
Types of Server... ?
Server Platform
Application Server
Audio/Video Server
Chat Server
Fax Server
Groupware Server
IRC Server
FTP Server
News Server
Proxy Server
Telnet Server
Virtual Servers
Web Server
List Server
Mail Server
Directory Server
Open Source Web Architecture... ?
Security
Why Web Servers Are Compromised... ?
Impact of Web-ServerAttacks... ?
Compromise of User Accounts
Data Tampering
Website Defacement
Secondary Attacks from the compromised website
Data Theft
Root Access to other Applications and Programs
Attacks
ServerMisconfiguration Attack...
The following default or incorrect configuration in the httpd.conf file on an
Apache server does not restrict access to the server-status page:
<Location /server-status>
SetHandler server-status
</Location>
This configuration allows the server status page to be viewed.
Example :
Directory traversal is an HTTP exploit which allows attackers to access restricted
directories and execute commands outside of the web server's root directory.
Directory Traversal Attack... ?
Web servers provide two main levels of security mechanisms
Access Control Lists (ACLs)
Root directory
GET http://test.webarticles.com/show.asp?view=oldarchive.html HTTP/1.1
Host: test.webarticles.com
Example :
GET http://test.webarticles.com/show.asp?view=../../../../../Windows/system.ini HTTP/1.1
Host: test.webarticles.com
GET http://server.com/scripts/..%5c../Windows/System32/cmd.exe?/c+dir+c: HTTP/1.1
Host: server.com
Man-In-The-Middle Attack... ?
A man-in-the-middle attack is one in which the attacker secretly intercepts and relays
messages between two parties who believe they are communicating directly with each
other.
HTTPResponse Splitting Attack... ?
In the HTTP Response Splitting attack, there are always 3 parties (at least) involved :
Web server - which has a security hole enabling HTTP Response Splitting
Target - an entity that interacts with the web server on behalf of the attacker.
Attacker - initiates the attack
Header splitting is an attack designed to steal data from users of a site. It can be used
to execute cross site scripting attacks, steal user data, or deface sites such that they
appear to contain content the creator did not intend.
<?php
header ("Location: " . $_GET['page']);
?>
http://icis.digitalparadox.org/~dcrab/redirect.php?page=http://www.digitalparadox.org
Example :
HTTPCache Poisoning Attacks... ?
HTTP Cache Poisoning is actually a very straight forward modification to HTTP splitting
and can be achieved by simply adding a header indicating that the version of the page
being returned was last modified sometime in the future, which will in turn trigger the
browser to cache said page.
In fact, setting the last modified header for the page to the future ensures subsequent
requests for that page will result in a 304 Not Modified header response form the server,
until such a time that the cache is outdated.
foobar
Content-Length: 0
HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Mon, 28 Sep 2016 14:50:18 GMT
Content-Length: 47
Hacker was here
Example :
DNS Hijacking ... ?
DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that
overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the
default DNS settings
A hacker or a malware program gains unauthorized access to your computer and changes the
DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and
maintained by the hacker.
Other dangers of DNS hijacking include the following attacks: Pharming
Phishing
DNS Amplification Attack... ?
A Domain Name Server (DNS) amplification attack is a popular form of distributed denial
of service (DDoS) that relies on the use of publically accessible open DNS servers to
overwhelm a victim system with DNS response traffic.
Impact
A misconfigured Domain Name System (DNS) server can be exploited to participate in a
distributed denial of service (DDoS) attack.
In March 2013, the method was used to target Spamhaus, likely by a purveyor of
malware whose business, the organization had disrupted by blacklisting. The
anonymity of the attack was such that Spamhaus is still unsure of the source.
Furthermore, the attack was so severe that it temporarily crippled and almost brought
down the Internet.
Top 10 Password Cracking Techniques... ?
1. Dictionary attack
2. Brute force attack
3. Rainbow table attack
4. Phishing
5. Social engineering
6. Malware
7. Offline cracking
8. Shoulder surfing
9. Spidering
10. Guess
SSHBrute Force Attack... ?
SSH is an acronym which stands for Secure SHell, which provides a secure shell
access to a remote machine.
wget http://zeldor.biz/other/bruteforce/passlist.txt
wget http://zeldor.biz/other/bruteforce/brutessh.zip
python brutessh.py -h 10.1.100.4 -u root -d passlist.txt
Web-ServerPassword Cracking Attacks... ?
A hacker can use variety of password Cracking Techniques such as Brute force,
Dictionary attacks and rainbow tables to crack weak administrator account passwords,
For Gmail Password cracking Syntax are like below :-
hydra -S -l <email> -P <passlist.txt> -e ns -V -s 465 smtp.gmail.com smtp
Example : THC - Hydra
DOS/DDOS Attack... ?
Renders websites and other online resources unavailable to intended users.
DoS threats come in many flavors, with some directly targeting the underlying server
infrastructure. Others exploit vulnerabilities in application and communication protocols.
A successful DoS attack is a highly noticeable event impacting the entire online user
base. This makes it a popular weapon of choice for hacktivists, cyber vandals,
extortionists and anyone else looking to make a point or champion a cause.
A website in France was hammered by a Distributed Denial of Service attack
that hit it at a rate from 325Gbps to 400Gbps making it the strongest DDoS
attack ever.
Phishing Attacks ... ?
Phishing is an e-mail fraud method in
which the perpetrator sends out legitimate-
looking email in an attempt to gather
personal and financial information from
recipients.
Typically, the messages appear to come
from well known and trustworthy Web
sites.
Web sites that are frequently spoofed by
phishers include PayPal, eBay, MSN,
Yahoo, BestBuy, and America Online.
Advance Phishing Attacks using HTML5 Fullscreen API... ?
Website Defacement... ?
The term "website defacement" refers to any unauthorized changes made to the
appearance of either a single webpage, or an entire site.
In some cases, a website is completely taken down and replaced by something new.
In other instances, a hacker may inject code in order to add images, popups, or text to a
page that were not previously present.
Massachusetts Institute of Technology website hacked by Indian HACKER
Sahoo hacked the website: http://web.stanford.edu/~mclindon/cgi-bin/
Indian Defence organisation DRDO website hacked
ISRO's Antrix Website Hacked
http://kerala.gov.in/Website Hacked
Attacks On Web Applications... ?
Securing a Web Server.... ?
01. Remove Unnecessary Services
02. Remote access
03. Separate development / testing / production environment
04. Web application content and server-side scripting
05. Permissions and privileges
06. Install all security patches on time
07. Monitor and audit the server
08. User accounts
09. Remove all unused modules and application extensions
10. Use security tools provided with web server software
11. Stay informed
12. Use Scanners
Whats Cooking Next... ?
Webserver Attack Methodology
Application Security Scanner
Mirroring a Website
Vulnerability Scanning
Tools Demo :
Web Password Cracking Tool : THC-Hydra and Brutus
Web Server Security Scanner : Wikto and Acunetix Web Vulnerability Scanner
Web Server Pen Testing Tool : CORE Impact® Pro
Web Application Security Scanner: Syhunt Dynamic and N-Stalker Web
Enumerating Webserver Information Using Nmap
References Page -1
http://sepiahost.com/assets/images/features/server-security-audit.png
http://thehackernews.com/
http://www.slideshare.net/bharaths7/web-security
http://www.naseerahmad.com/newBlog/wp-content/uploads/2010/01/ComputerTerminology.jpg
http://projects.webappsec.org/w/page/13246959/Server%20Misconfiguration
http://www.acunetix.com/websitesecurity/directory-traversal/
http://www.golemtechnologies.com/articles/http-response-splitting
http://projects.webappsec.org/w/page/13246931/HTTP%20Response%20Splitting
http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
http://www.golemtechnologies.com/articles/http-response-splitting
http://link.springer.com/referenceworkentry/10.1007%2F978-1-4419-5906-5_666
http://deadlytechnology.com/web-development/http-attack/
http://www.hackguide4u.com/2010/10/dns-cache-poisoning-reviewed-tools.html
http://d2chgkz0kdtxdm.cloudfront.net/wp-content/uploads/2008/07/dns-poison.png
http://zeldor.biz/2011/01/how-to-bruteforce-ssh/
References Page-2
http://searchsecurity.techtarget.com/definition/man-in-the-middle-attack
https://www.multicert.com/fotos/editor2/men-in-the-middle-ingles.png
https://labs.ripe.net/Members/johannes_weber/RAAttackMITM.jpg
http://www.rafayhackingarticles.net/2011/02/web-server-hacking-techniques.html
http://www.alphr.com/features/371158/top-ten-password-cracking-techniques
https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
http://www.zdnet.com/article/worst-ddos-attack-of-all-time-hits-french-site/
http://www.gohacking.com/dns-hijacking/
https://www.us-cert.gov/ncas/alerts/TA13-088A
http://whatis.techtarget.com/definition/DNS-amplification-attack
http://searchsecurity.techtarget.com/definition/phishing
http://www.websitepulse.com/blog/what-is-website-defacement
http://img01.ibnlive.in/ibnlive/uploads/2012/11/govt_drdo_hack.jpg
https://twitter.com/Atulmaharaj/status/620168881504518144/photo/1
http://www.hackersnewsbulletin.com/2014/08/massachusetts-institute-technology-website-hacked-indian-
hacker.html
https://www.eccouncil.org
http://www.itmonteur.net/wp-content/uploads/2012/09/Server_Security_Management.png
http://www.acunetix.com/websitesecurity/webserver-security/
Jitendra Kumar Patel
www.jitendrapatel.in
jitendra.patel@iiitb.org
@bewithjitendra
facebook.com/bewithjitendrapatel
Monday, September 28, 2015
Introduction to Web Server Security

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Software security
Software securitySoftware security
Software security
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Https presentation
Https presentationHttps presentation
Https presentation
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
File security system
File security systemFile security system
File security system
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Ssl https
Ssl httpsSsl https
Ssl https
 
Web Security
Web SecurityWeb Security
Web Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 

Ähnlich wie Introduction to Web Server Security

Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptSilverGold16
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security ThreatsHTS Hosting
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2WPWhiteBoard
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awarenessJanagi Kannan
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsB R SOFTECH PVT LTD
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityChris Hillman
 

Ähnlich wie Introduction to Web Server Security (20)

Major Web Sever Threat.pptx
Major Web Sever Threat.pptxMajor Web Sever Threat.pptx
Major Web Sever Threat.pptx
 
4.Xss
4.Xss4.Xss
4.Xss
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security Threats
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
 
Information security
Information securityInformation security
Information security
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Starwest 2008
Starwest 2008Starwest 2008
Starwest 2008
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Lets Make our Web Applications Secure
Lets Make our Web Applications SecureLets Make our Web Applications Secure
Lets Make our Web Applications Secure
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Mehr von JITENDRA KUMAR PATEL

Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExplodedIntroduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExplodedJITENDRA KUMAR PATEL
 
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-NetworksImproving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-NetworksJITENDRA KUMAR PATEL
 
Manufacturing Compromise The Emergence of Exploit-as-a-Service
Manufacturing Compromise The Emergence of Exploit-as-a-ServiceManufacturing Compromise The Emergence of Exploit-as-a-Service
Manufacturing Compromise The Emergence of Exploit-as-a-ServiceJITENDRA KUMAR PATEL
 
Introduction to node.js aka NodeJS
Introduction to node.js aka NodeJSIntroduction to node.js aka NodeJS
Introduction to node.js aka NodeJSJITENDRA KUMAR PATEL
 

Mehr von JITENDRA KUMAR PATEL (7)

Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExplodedIntroduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
Introduction-To-SMPC-Philips-Innovation-Campus-SecurityExploded
 
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-NetworksImproving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
Improving-The-Round-Complexity-of-VSS-in-Point-To-Point-Networks
 
Glyph-Placement-Strategy
Glyph-Placement-StrategyGlyph-Placement-Strategy
Glyph-Placement-Strategy
 
Manufacturing Compromise The Emergence of Exploit-as-a-Service
Manufacturing Compromise The Emergence of Exploit-as-a-ServiceManufacturing Compromise The Emergence of Exploit-as-a-Service
Manufacturing Compromise The Emergence of Exploit-as-a-Service
 
Secure 2 Party AES
Secure 2 Party AESSecure 2 Party AES
Secure 2 Party AES
 
Introduction to node.js aka NodeJS
Introduction to node.js aka NodeJSIntroduction to node.js aka NodeJS
Introduction to node.js aka NodeJS
 
Docker meetup-jan-2015
Docker meetup-jan-2015Docker meetup-jan-2015
Docker meetup-jan-2015
 

Kürzlich hochgeladen

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Introduction to Web Server Security