SlideShare ist ein Scribd-Unternehmen logo
1 von 47
DeepPhish Simulating Malicious AI
Alejandro Correa Bahnsen, PhD
VP, AI & Research – CyxteraTechnologies
About Me
• Industrial Engineer
• PhD in Machine Learning
• Passionate about open-source
• Scikit-Learn contributor
• Organizer of Data Science Meetups
Who I’ve worked with
Agenda
• Phishing URL Detection using Machine Learning
• Malicious Cert Detection using Deep Learning
• DeepPhish: Simulating Malicious AI
• Demo
Typical Phishing Example
Why Phishing Detection is Hard?
Original Website Only Using Images Subtle Changes
Ideal Phishing Detection System
Is It
Phishing?
Machine
Learning
Algorithm
Ideal Phishing Detection System
Issues with full content analysis:
• Time consuming
• Impractical to process millions of websites per day
• Hard to implement for small devices
There is always the need for an URL
Database of URLs
http://moviesjingle.com/auto/163.com/index.php
1,000,000 Legitimate URLs from Common Crawl
http://paypal.com.update.account.toughbook.cl/8a30e847925afc5975161aeabe8930f
1/?cmd=_home&dispatch=d09b78f5812945a73610edf38
http://msystemtech.ru/components/com_users/Italy/zz/Login.php?run=_login-
submit&session=68bbd43c854147324d77872062349924
https://www.sanfordhealth.org/ChildrensHealth/Article/73980
http://www.grahamleader.com/ci_25029538/these-are-5-worst-super-bowl-halftime-
shows&defid=1634182
http://www.carolinaguesthouse.co.uk/onlinebooking/?industrytype=1&startdate=201
3-09-05&nights=2&location&productid=25d47a24-6b74
1,000,000 Phishing URLs from Phish Tank
Recurrent Neural Networks RNN
Recurrent Neural Networks RNN
URL
h
t
t
p
:
/
/
w
w
w
.
p
a
p
a
y
a
.
c
o
m
One hot
Encoding
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
Embedding
3.2 1.2 … 1.7
6.4 2.3 … 2.6
6.4 3.0 … 1.7
3.4 2.6 … 3.4
2.6 3.8 … 2.6
3.5 3.2 … 6.4
1.7 4.2 … 6.4
8.6 2.4 … 6.4
4.3 2.9 … 6.4
2.2 3.4 … 3.4
3.2 2.6 … 2.6
4.2 2.2 … 3.5
2.4 3.2 … 1.7
2.9 1.7 … 8.6
3.0 6.4 … 2.6
2.6 6.4 … 3.8
3.8 3.4 … 3.2
3.3 2.6 … 2.2
3.1 2.2 … 2.9
1.8 3.2 … 3.0
2.5 6.4 … 2.6
LSTM
LSTM
LSTM
LSTM
Sigmoid
…
URL Classification Results
3-Fold CV Accuracy Recall Precision
Average 98.76% 98.93% 98.60%
Deviation 0.04% 0.02% 0.02%
URL Classification Results
3-Fold CV Accuracy Recall Precision
Average 98.76% 98.93% 98.60%
Deviation 0.04% 0.02% 0.02%
Detecting Malicious URLs
Is Not Enough!!
Images from: https://info.phishlabs.com/blog/quarter-phishing-attacks-hosted-https-domains
What is a Web Certificate?
Secure | https://ultrabank.com
http://ultrabank.com
Forrester survey asked users: “Some websites receive the following browser
user interface security indicator in the browser. What do you think the
security indicator is intended to tell users?”
The website is safe: 82%
The website is encrypted: 75%
The website is trustworthy: 66%
The website is private: 32%
Secure | https://ultrabank.com
Forrester survey asked users: “Some websites receive the following browser
user interface security indicator in the browser. What do you think the
security indicator is intended to tell users?”
The website is safe: 82%
The website is encrypted: 75%
The website is trustworthy: 66%
The website is private: 32%
Secure | https://ultrabank.com
Hunting Malicious TLS
Certificates with Deep
Neural Networks
Database of TLS Certificates
1,000,000 Legitimate Certificates from Common Crawl
5,000 Phishing Certificates
CN = *.stackexchange.com, O = Stack Exchange, Inc., L = New York, S = NY, C = US
CN = localhost, L = Springfield
CN = slack.com, O = Slack Technologies, Inc., L = San Francisco, S = CA, C = US
CN = *.trello.com, O = Trello Inc., L = New York, S = New York, C = US
CN = localhost.localdomain
CN = example.com, L = Springfield
Deep Learning Algorithm
MIIDwTCCAqmgAwIBAgIJAK1oh1Kz5c91MA0GCS
qGSIb3DQEBCwUAMHcxCzAJBgNVBAYTAkdCMQ
8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkx
vbmRvbjEYMBYGA1UECgwPR2xvYmFsIFNlY3Vya
XR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50
MRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0xO
DA0MTYwODMwMDBaFw0xOTA0MTYwODMwMD
BaHcxCzAJBgNVBAYTAkdCMQ8wDQYDVQQIDAZ
Mb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYG
A1UECgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDV
QQLDA1JVCBEZXBhcnRtZW50MRQwEgYDVQQD
DAtleGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQE
BBQADggEPADCCAQoCggEBAObk0iX0qa/zAdNd
D70TR5xj2qbg7JnAEAi8x4Hn0tJh2FYXHPdN8+mC
yCDEA0zBcYs+…
MIIDwTCCAqmgAwIBAgIJAK1oh1Kz5c91MA0GCS
qGSIb3DQEBCwUAMHcxCzAJBgNVBAYTAkdCMQ
8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkx
vbmRvbjEYMBYGA1UECgwPR2xvYmFsIFNlY3Vya
XR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50
MRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0xO
DA0MTYwODMwMDBaFw0xOTA0MTYwODMwMD
BaHcxCzAJBgNVBAYTAkdCMQ8wDQYDVQQIDAZ
Mb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYG
A1UECgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDV
QQLDA1JVCBEZXBhcnRtZW50MRQwEgYDVQQD
DAtleGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQE
BBQADggEPADCCAQoCggEBAObk0iX0qa/zAdNd
D70TR5xj2qbg7JnAEAi8x4Hn0tJh2FYXHPdN8+mC
yCDEA0zBcYs+…
MIIDwTCCAqmgAwIBAgIJAK1oh1Kz5c91MA0GCS
qGSIb3DQEBCwUAMHcxCzAJBgNVBAYTAkdCMQ
8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkx
vbmRvbjEYMBYGA1UECgwPR2xvYmFsIFNlY3Vya
XR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50
MRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0xO
DA0MTYwODMwMDBaFw0xOTA0MTYwODMwMD
BaHcxCzAJBgNVBAYTAkdCMQ8wDQYDVQQIDAZ
Mb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYG
A1UECgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDV
QQLDA1JVCBEZXBhcnRtZW50MRQwEgYDVQQD
DAtleGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQE
BBQADggEPADCCAQoCggEBAObk0iX0qa/zAdNd
D70TR5xj2qbg7JnAEAi8x4Hn0tJh2FYXHPdN8+mC
yCDEA0zBcYs+…
MIIDwTCCAqmgAwIBAgIJAK1oh1Kz5c91MA0GCS
qGSIb3DQEBCwUAMHcxCzAJBgNVBAYTAkdCMQ
8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkx
vbmRvbjEYMBYGA1UECgwPR2xvYmFsIFNlY3Vya
XR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50
MRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0xO
DA0MTYwODMwMDBaFw0xOTA0MTYwODMwMD
BaHcxCzAJBgNVBAYTAkdCMQ8wDQYDVQQIDAZ
Mb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYG
A1UECgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDV
QQLDA1JVCBEZXBhcnRtZW50MRQwEgYDVQQD
DAtleGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQE
BBQADggEPADCCAQoCggEBAObk0iX0qa/zAdNd
D70TR5xj2qbg7JnAEAi8x4Hn0tJh2FYXHPdN8+mC
yCDEA0zBcYs+…
MIIDwTCCAqmgAwIBAgIJAK1oh1Kz5c91MA0GCS
qGSIb3DQEBCwUAMHcxCzAJBgNVBAYTAkdCMQ
8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkx
vbmRvbjEYMBYGA1UECgwPR2xvYmFsIFNlY3Vya
XR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50
MRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0xO
DA0MTYwODMwMDBaFw0xOTA0MTYwODMwMD
BaHcxCzAJBgNVBAYTAkdCMQ8wDQYDVQQIDAZ
Mb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYG
A1UECgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDV
QQLDA1JVCBEZXBhcnRtZW50MRQwEgYDVQQD
DAtleGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQE
BBQADggEPADCCAQoCggEBAObk0iX0qa/zAdNd
D70TR5xj2qbg7JnAEAi8x4Hn0tJh2FYXHPdN8+mC
yCDEA0zBcYs+…
MIIDwTCCAqmgAwIBAgIJAK1oh1Kz5c91MA0GCS
qGSIb3DQEBCwUAMHcxCzAJBgNVBAYTAkdCMQ
8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkx
vbmRvbjEYMBYGA1UECgwPR2xvYmFsIFNlY3Vya
XR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50
MRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0xO
DA0MTYwODMwMDBaFw0xOTA0MTYwODMwMD
BaHcxCzAJBgNVBAYTAkdCMQ8wDQYDVQQIDAZ
Mb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYG
A1UECgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDV
QQLDA1JVCBEZXBhcnRtZW50MRQwEgYDVQQD
DAtleGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQE
BBQADggEPADCCAQoCggEBAObk0iX0qa/zAdNd
D70TR5xj2qbg7JnAEAi8x4Hn0tJh2FYXHPdN8+mC
yCDEA0zBcYs+…
MIIDwTCCAqmgAwIBAgIJAK1oh1Kz5c91MA0GCS
qGSIb3DQEBCwUAMHcxCzAJBgNVBAYTAkdCMQ
8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkx
vbmRvbjEYMBYGA1UECgwPR2xvYmFsIFNlY3Vya
XR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50
MRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0xO
DA0MTYwODMwMDBaFw0xOTA0MTYwODMwMD
BaHcxCzAJBgNVBAYTAkdCMQ8wDQYDVQQIDAZ
Mb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYG
A1UECgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDV
QQLDA1JVCBEZXBhcnRtZW50MRQwEgYDVQQD
DAtleGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQE
BBQADggEPADCCAQoCggEBAObk0iX0qa/zAdNd
D70TR5xj2qbg7JnAEAi8x4Hn0tJh2FYXHPdN8+mC
yCDEA0zBcYs+…
MIIDwTCCAqmgAwIBAgIJAK1oh1Kz5c91MA0GCS
qGSIb3DQEBCwUAMHcxCzAJBgNVBAYTAkdCMQ
8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkx
vbmRvbjEYMBYGA1UECgwPR2xvYmFsIFNlY3Vya
XR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50
MRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0xO
DA0MTYwODMwMDBaFw0xOTA0MTYwODMwMD
BaHcxCzAJBgNVBAYTAkdCMQ8wDQYDVQQIDAZ
Mb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYG
A1UECgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDV
QQLDA1JVCBEZXBhcnRtZW50MRQwEgYDVQQD
DAtleGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQE
BBQADggEPADCCAQoCggEBAObk0iX0qa/zAdNd
D70TR5xj2qbg7JnAEAi8x4Hn0tJh2FYXHPdN8+mC
yCDEA0zBcYs+… Pre-Processing Hidden Layers Output
Deep Learning Algorithm
One hot encoding One hot encoding
Embedding Embedding
LSTM LSTM Dense/ReLu
Dropout Dropout Dropout
Concatenate
Dense/ReLu
Dropout
Dense/Logit
score
Subject Principal Issuer Principal Extracted Features
Malicious Cert Classification Results
5-Fold CV Accuracy Recall Precision
Average 86.41% 83.20% 88.86%
Deviation 1.22% 3.29% 1.04%
DeepPhish Simulating
Malicious AI
The Experiment: Simulating Malicious AI
Identify
individual
threat actors
Run them through
our own AI
detection system
Improve their
attacks using
AI
Uncovering Threat Actors
• Objective: We want to understand effective patterns of
each attacker to improve them through a AI model
• As we can not know attackers directly, we must learn from
them through their attacks
• Database with 1.1M confirm phishing URLs collected from
Phishtank
Threat Actor 1
naylorantiques.com
406 URLs
http://naylorantiques.com/components/com_contact/views/c
ontact/tmpl/62
http://naylorantiques.com/docs/Auto/Atendimento/5BBROPI
6S3
http://naylorantiques.com/Atualizacao
Segura/pictures/XG61YYMT_FXW0PWR8_5P2O7T2U_P9HND
PQR/
http://naylorantiques.com/zifn3p72bsifn9hx9ldecd8jzl2f0xlwf
8f
http://www.naylorantiques.com/JavaScript/charset=iso-8859-
1/http-equiv/margin-bottom
Keywords
atendimento, jsf, identificacao, ponents, views, TV, mail, SHOW,
COMPLETO, VILLA, MIX, ufi, pnref, story, tryy2ilr, Autentico
106 domains
naylorantiques.com, netshelldemos.com, debbiebright.co.z,
waldronfamilygppractice.co.uk , avea-vacances.com , psncodes2013.com
uni5.net , 67.228.96.204, classificadosmaster.com.br, ibjjf.org
Visual Check
Check in
database
Visual Check
Threat Actor 2
Vopus.org
13 URLs
http://www.vopus.org/es/images/cursos/thumbs/tdcanadatr
ust
http://www.vopus.org/ru/media/tdcanadatrust/index.html
http://vopus.org/common/index.htm
http://www.vopus.org/es/images/cursos/thumbs/tdcanadatr
ust/index.html
http://vopus.org/descargas/otros/tdcanadatrust/index.html
Keywords
tdcanadatrust/index.html
19 domains
friooptimo.com, kramerelementary.org, kalblue.com, vopus.org,
artwood.co.kr, stephenpizzuti.com, heatherthinks.com, corvusseo.com,
natikor.by, optioglobal.com, backfire.se, fncl.ma, greenant.de,
mersintenisakademisi.com, cavtel.net
Check in
database
Visual Check
Visual Check
The Experiment: Simulating Malicious AI
Identify
individual
threat actors
Run them through
our own AI
detection system
Improve their
attacks using
AI
DEMO!!!
Threat Actors Effectiveness
0.24% 0.69%
4.91%
All Attacks (1,146,441) Threat Actor 1 (1,009) Threat Actor 2 (102)
The Experiment: Simulating Malicious AI
Identify
individual
threat actors
Run them through
our own AI
detection system
Improve their
attacks using
AI
DeepPhish Algorithm - Training
Non Effective URLs
Effective URLs
Encoding
…
…
…
…
…
Model
Az Rolling
Window
Concatenate
andcreate
Transform
Train
http://www.naylorantiques.com/content/centrais/fon
e_facil
http://kisanart.com/arendivento/menu-opcoes-fone-
facil/
http://naylorantiques.com/atendimento/menu-
opcoes-fone-facil/3
http://www.naylorantiques.com/con
tent/centrais/fone_facilhttp://kisana
rt.com/arendivento/menu-opcoes-
fone-
facil/http://naylorantiques.com/aten
dimento/menu-opcoes-fone-facil/3
DeepPhish LSTM Network
URL
h
t
t
p
:
/
/
w
w
w
.
p
a
p
a
y
a
.
c
o
m
One hot
Encoding
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
…
LSTM
LSTM
LSTM
LSTM
Softmax
…
tanH
tanH
tanH
tanH
…
DeepPhish Algorithm - Prediction
Compromised
Domains
Allowed
Paths
+
Model
Filter
paths
Predict
Next
Character
Iteratively
Synthetic
URLs
/arendipemto/nenu-
opcines-fone-facil
vfone/faci/
Atondime
http:// + www.naylorantiques.com +
/arendipemto/nenu-opcines-fone-
facilvone/facil/Atondime
Create
Traditional Attacks vs. AI-Driven Attacks
0.69%
Traditional DeepPhish
4.91%
Traditional DeepPhish
Threat Actor 1 Threat Actor 2
20.90%
36.28%
Traditional Attacks vs. AI-Driven Attacks
0.69%
Traditional DeepPhish
4.91%
Traditional DeepPhish
Threat Actor 1 Threat Actor 2
20.90%
36.28%
What’s Next??
What’s Next??
AI powered Attacks are real, as we probed with Deep
Phish experiment.
We need to enhance our own AI detection systems to
account for the possibility of attackers using AI.
Thanks!!
Alejandro Correa Bahnsen, PhD
VP, AI & Research
alejandro.correa@cyxtera.com
@albahnsen

Weitere ähnliche Inhalte

Was ist angesagt?

Python selenium
Python seleniumPython selenium
Python seleniumDucat
 
Building beautiful apps using google flutter
Building beautiful apps using google flutterBuilding beautiful apps using google flutter
Building beautiful apps using google flutterAhmed Abu Eldahab
 
Sentiment Analysis Using Machine Learning
Sentiment Analysis Using Machine LearningSentiment Analysis Using Machine Learning
Sentiment Analysis Using Machine LearningNihar Suryawanshi
 
React.js 세미나
React.js 세미나React.js 세미나
React.js 세미나Briantina
 
The Kotlin Programming Language
The Kotlin Programming LanguageThe Kotlin Programming Language
The Kotlin Programming Languageintelliyole
 
Use of artificial neural networks to identify fake profiles
Use of artificial neural networks to identify fake profilesUse of artificial neural networks to identify fake profiles
Use of artificial neural networks to identify fake profilesVenkat Projects
 
Android Internship report presentation
Android Internship report presentationAndroid Internship report presentation
Android Internship report presentationvinayh.vaghamshi _
 
Scikit-Learn: Machine Learning in Python
Scikit-Learn: Machine Learning in PythonScikit-Learn: Machine Learning in Python
Scikit-Learn: Machine Learning in PythonMicrosoft
 
Hybrid application development
Hybrid application developmentHybrid application development
Hybrid application developmentKnoldus Inc.
 

Was ist angesagt? (20)

Social Media Android APP
Social Media Android APPSocial Media Android APP
Social Media Android APP
 
Python selenium
Python seleniumPython selenium
Python selenium
 
Tutorial on Web Scraping in Python
Tutorial on Web Scraping in PythonTutorial on Web Scraping in Python
Tutorial on Web Scraping in Python
 
Building beautiful apps using google flutter
Building beautiful apps using google flutterBuilding beautiful apps using google flutter
Building beautiful apps using google flutter
 
Sentiment Analysis Using Machine Learning
Sentiment Analysis Using Machine LearningSentiment Analysis Using Machine Learning
Sentiment Analysis Using Machine Learning
 
Web Scraping
Web ScrapingWeb Scraping
Web Scraping
 
React.js 세미나
React.js 세미나React.js 세미나
React.js 세미나
 
Web Mining
Web Mining Web Mining
Web Mining
 
Registry Forensics
Registry ForensicsRegistry Forensics
Registry Forensics
 
The Kotlin Programming Language
The Kotlin Programming LanguageThe Kotlin Programming Language
The Kotlin Programming Language
 
Web Usage Pattern
Web Usage PatternWeb Usage Pattern
Web Usage Pattern
 
Win scp
Win scpWin scp
Win scp
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
 
Computer vision
Computer visionComputer vision
Computer vision
 
Use of artificial neural networks to identify fake profiles
Use of artificial neural networks to identify fake profilesUse of artificial neural networks to identify fake profiles
Use of artificial neural networks to identify fake profiles
 
Automotive android
Automotive androidAutomotive android
Automotive android
 
Node.js căn bản
Node.js căn bảnNode.js căn bản
Node.js căn bản
 
Android Internship report presentation
Android Internship report presentationAndroid Internship report presentation
Android Internship report presentation
 
Scikit-Learn: Machine Learning in Python
Scikit-Learn: Machine Learning in PythonScikit-Learn: Machine Learning in Python
Scikit-Learn: Machine Learning in Python
 
Hybrid application development
Hybrid application developmentHybrid application development
Hybrid application development
 

Ähnlich wie black hat deephish

How I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsHow I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsAlejandro Correa Bahnsen, PhD
 
The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security MindsetAdam W. Warner
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdNipun Jaswal
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security TestingTEST Huddle
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseJohn Bambenek
 
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...Outpost24
 
Crash Course In Brain Surgery
Crash Course In Brain SurgeryCrash Course In Brain Surgery
Crash Course In Brain Surgerymorisson
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Ruby Meditation
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In SecurityPrasanna V
 
Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHPjikbal
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysJoff Thyer
 
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2Chris Gates
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsSecurity Innovation
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryPriyanka Aash
 

Ähnlich wie black hat deephish (20)

How I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsHow I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data Products
 
The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security Mindset
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
 
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
 
Crash Course In Brain Surgery
Crash Course In Brain SurgeryCrash Course In Brain Surgery
Crash Course In Brain Surgery
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
 
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
 
Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHP
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
NPTs
NPTsNPTs
NPTs
 

Mehr von Alejandro Correa Bahnsen, PhD

AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?Alejandro Correa Bahnsen, PhD
 
Fraud Detection by Stacking Cost-Sensitive Decision Trees
Fraud Detection by Stacking Cost-Sensitive Decision TreesFraud Detection by Stacking Cost-Sensitive Decision Trees
Fraud Detection by Stacking Cost-Sensitive Decision TreesAlejandro Correa Bahnsen, PhD
 
Maximizing a churn campaigns profitability with cost sensitive machine learning
Maximizing a churn campaigns profitability with cost sensitive machine learningMaximizing a churn campaigns profitability with cost sensitive machine learning
Maximizing a churn campaigns profitability with cost sensitive machine learningAlejandro Correa Bahnsen, PhD
 
Classifying Phishing URLs Using Recurrent Neural Networks
Classifying Phishing URLs Using Recurrent Neural NetworksClassifying Phishing URLs Using Recurrent Neural Networks
Classifying Phishing URLs Using Recurrent Neural NetworksAlejandro Correa Bahnsen, PhD
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 
PhD Defense - Example-Dependent Cost-Sensitive Classification
PhD Defense - Example-Dependent Cost-Sensitive ClassificationPhD Defense - Example-Dependent Cost-Sensitive Classification
PhD Defense - Example-Dependent Cost-Sensitive ClassificationAlejandro Correa Bahnsen, PhD
 
Ensembles of example dependent cost-sensitive decision trees slides
Ensembles of example dependent cost-sensitive decision trees slidesEnsembles of example dependent cost-sensitive decision trees slides
Ensembles of example dependent cost-sensitive decision trees slidesAlejandro Correa Bahnsen, PhD
 
Fraud analytics detección y prevención de fraudes en la era del big data sl...
Fraud analytics detección y prevención de fraudes en la era del big data   sl...Fraud analytics detección y prevención de fraudes en la era del big data   sl...
Fraud analytics detección y prevención de fraudes en la era del big data sl...Alejandro Correa Bahnsen, PhD
 
Maximizing a churn campaign’s profitability with cost sensitive predictive an...
Maximizing a churn campaign’s profitability with cost sensitive predictive an...Maximizing a churn campaign’s profitability with cost sensitive predictive an...
Maximizing a churn campaign’s profitability with cost sensitive predictive an...Alejandro Correa Bahnsen, PhD
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionAlejandro Correa Bahnsen, PhD
 
2013 credit card fraud detection why theory dosent adjust to practice
2013 credit card fraud detection why theory dosent adjust to practice2013 credit card fraud detection why theory dosent adjust to practice
2013 credit card fraud detection why theory dosent adjust to practiceAlejandro Correa Bahnsen, PhD
 

Mehr von Alejandro Correa Bahnsen, PhD (18)

DeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AIDeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AI
 
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
AI vs. AI: Can Predictive Models Stop the Tide of Hacker AI?
 
Fraud Detection by Stacking Cost-Sensitive Decision Trees
Fraud Detection by Stacking Cost-Sensitive Decision TreesFraud Detection by Stacking Cost-Sensitive Decision Trees
Fraud Detection by Stacking Cost-Sensitive Decision Trees
 
Maximizing a churn campaigns profitability with cost sensitive machine learning
Maximizing a churn campaigns profitability with cost sensitive machine learningMaximizing a churn campaigns profitability with cost sensitive machine learning
Maximizing a churn campaigns profitability with cost sensitive machine learning
 
Classifying Phishing URLs Using Recurrent Neural Networks
Classifying Phishing URLs Using Recurrent Neural NetworksClassifying Phishing URLs Using Recurrent Neural Networks
Classifying Phishing URLs Using Recurrent Neural Networks
 
Demystifying machine learning using lime
Demystifying machine learning using limeDemystifying machine learning using lime
Demystifying machine learning using lime
 
1609 Fraud Data Science
1609 Fraud Data Science1609 Fraud Data Science
1609 Fraud Data Science
 
Modern Data Science
Modern Data ScienceModern Data Science
Modern Data Science
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
PhD Defense - Example-Dependent Cost-Sensitive Classification
PhD Defense - Example-Dependent Cost-Sensitive ClassificationPhD Defense - Example-Dependent Cost-Sensitive Classification
PhD Defense - Example-Dependent Cost-Sensitive Classification
 
Ensembles of example dependent cost-sensitive decision trees slides
Ensembles of example dependent cost-sensitive decision trees slidesEnsembles of example dependent cost-sensitive decision trees slides
Ensembles of example dependent cost-sensitive decision trees slides
 
Fraud analytics detección y prevención de fraudes en la era del big data sl...
Fraud analytics detección y prevención de fraudes en la era del big data   sl...Fraud analytics detección y prevención de fraudes en la era del big data   sl...
Fraud analytics detección y prevención de fraudes en la era del big data sl...
 
Analytics - compitiendo en la era de la informacion
Analytics - compitiendo en la era de la informacionAnalytics - compitiendo en la era de la informacion
Analytics - compitiendo en la era de la informacion
 
Maximizing a churn campaign’s profitability with cost sensitive predictive an...
Maximizing a churn campaign’s profitability with cost sensitive predictive an...Maximizing a churn campaign’s profitability with cost sensitive predictive an...
Maximizing a churn campaign’s profitability with cost sensitive predictive an...
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
 
2012 predictive clusters
2012 predictive clusters2012 predictive clusters
2012 predictive clusters
 
2013 credit card fraud detection why theory dosent adjust to practice
2013 credit card fraud detection why theory dosent adjust to practice2013 credit card fraud detection why theory dosent adjust to practice
2013 credit card fraud detection why theory dosent adjust to practice
 
2011 advanced analytics through the credit cycle
2011 advanced analytics through the credit cycle2011 advanced analytics through the credit cycle
2011 advanced analytics through the credit cycle
 

Kürzlich hochgeladen

Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 

Kürzlich hochgeladen (20)

Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 

black hat deephish