SlideShare ist ein Scribd-Unternehmen logo
1 von 210
CLOUD 9: UNCOVERING SECURITY & FORENSICS DISCOVERY IN CLOUD byManu Zacharia MVP (Enterprise Security), C|EH,  ISLA-2010 (ISC)², C|HFI, CCNA, MCP Certified ISO 27001:2005 Lead Auditor HackIT – Technology & Advisory Services “Aut viam inveniam aut faciam ”  Hannibal Barca
# whoami ,[object Object]
 For paying my bills – I do consulting -  HackIT – Technology & Advisory Services – A startup.
 Awards
Information Security Leadership Achievement Award from (ISC)² - 2010
 Microsoft Most Valuable Professional (Enterprise Security) – 2009 and 2010
Co-Author of a Book
 President – Information Security Research Association - NPO,[object Object]
 Founder c0c0n – International Security & Hacking Conference
 Extend service to various state and central investigations agencies as Cyber Forensics Consultant,[object Object]
 Microsoft Tech-Ed 2010 (& 2011 upcoming)
 IQPC - Enterprise Security 2010 - Singapore
 Information Security Conference - Bangalore
ClubHack, etc
DevCon,[object Object]
Indian Navy - Signal School , Centre for Defense Communication and Electronic and Information / Cyber Warfare  and INS Valsura.
Centre for Police Research, Pune and Kerala Police
 SCIT -  Symbiosis Centre for Information Technology,Pune
 Institute of Management Technology (IMT) – Ghaziabad
IGNOU M-Tech (Information Systems Security) – Expert Member – Curriculum Review Committee
C-DAC, ACTS (DISCS  & DSSD),[object Object]
 Registered brands belong to their legitimate owners.
 The information contained in this presentation does not break any intellectual property, nor does it provide detailed information that may be in conflict with any laws (hopefully...) :)6
REFERENCES ,[object Object],7
AGENDA INTRO & CLOUD ARCHITECTURE CLOUD SECURITY & RISK ASSESSMENT FRAMEWORK EXPLOITING CLOUD & FORENSICS CONCLUSION 8
INTRODUCTION 9
QUESTION ,[object Object]
 Do you know what is EC2 and S3?
 What is SPI Model?10
WHY THIS TALK? ,[object Object]
 Headline stealer
 Everybody is concerned about Cloud Security11
WHY CLOUD IS DIFFERENT? ,[object Object]
 Simple – power of cloud12
TIGR - ?????? ,[object Object],13
CLOUD POWER ,[object Object]
 Forget about those sleepless nights in your data centers14
EC2 ,[object Object]
 A web service that provides resizable compute capacity in the cloud15
EC2 - WIKIPEDIA ,[object Object]
 A user can boot an Amazon Machine Image (AMI) to create a virtual machine, which Amazon calls an "instance", containing any software desired.16
EC2 - WIKIPEDIA ,[object Object],17
S3 ,[object Object]
 Provides unlimited storage through a simple web services interface18
S3 ,[object Object]
 102 billion objects as of March 201019
POWER OF CLOUD ,[object Object]
 NASDAQ  uses Amazon S3 to deliver historical stock information.20
CLOUD ,[object Object]
 application and information resources from the underlying infrastructure, and
 the mechanisms used to deliver them.21
CLOUD  Use of a collection of ,[object Object]
 applications,
 information, and
 infrastructure  comprised of pools of compute, network, information, and storage resources. 22
CLOUD ,[object Object]
rapidly orchestrated,
 provisioned,
 implemented & decommissioned, and
 scaled up or down
 Provide an on-demand utility-like model.23
CLOUD CONFUSION ,[object Object]
 How cloud is both similar to and different from existing models of computing? 24
CLOUD CONFUSION ,[object Object]
 organizational,
 operational, and
 technological approaches to network and information security practices. 25
CLOUD SECURITY – DIFFERENT? Marcus Ranum - Same old,  Same old  26
CLOUD SECURITY – DIFFERENT? Same Client / Server paradigm from Mainframe days – Bruce Schneier 27
So what is this cloud? 28
CLOUD ARCHITECTURE 29
CLOUD ,[object Object]
 five essential characteristics,
 three cloud service models, and
 four cloud deployment models.30
CLOUD CHARACTERISTICS ,[object Object]
 On-demand self-service
 Broad network access
 Resource pooling
 Rapid elasticity
 Measured service31
CLOUD CHARACTERISTICS ,[object Object]
Unilaterally provision computing capabilities as needed automatically, without requiring human interaction with a service provider.
 Computing capabilities include server time and network storage 32
CLOUD CHARACTERISTICS ,[object Object]
Available over the network and accessed through standard mechanisms33
CLOUD CHARACTERISTICS ,[object Object],34
CLOUD CHARACTERISTICS ,[object Object]
 The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model,
 Different physical and virtual resources dynamically assigned and reassigned according to consumer demand.35
CLOUD CHARACTERISTICS ,[object Object]
 Customer may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). 36
CLOUD CHARACTERISTICS ,[object Object]
 storage,
 processing,
 memory,
 network bandwidth, and
 virtual machines.37
CLOUD CHARACTERISTICS ,[object Object]
 Capabilities can be
 rapidly and elastically provisioned to quickly scale out ; and
 rapidly released to quickly scale in.
 In some cases this is done automatically.38
CLOUD CHARACTERISTICS ,[object Object]
Metering capability at some level of abstraction appropriate to the type of service
 Resource usage can be monitored, controlled, and reported — providing transparency for both the provider and consumer of the service.39
CLOUD CHARACTERISTICS ,[object Object]
 storage,
 processing,
 bandwidth,
 active user accounts40
MYTHS - CLOUD CHARACTERISTICS ,[object Object]
Virtualization is mandatory
 Answer is No
 Cloud services are often but not always utilized in conjunction with, and enabled by, virtualization technologies41
MYTHS - CLOUD CHARACTERISTICS ,[object Object]
 In many offerings virtualization by hypervisor or operating system container is not utilized.42
MYTHS - CLOUD CHARACTERISTICS ,[object Object]
 Multi-tenancy is not called out as an essential cloud characteristic by NIST but is often discussed as such.43
CLOUD SERVICE MODELS ,[object Object]
 The three fundamental classifications are known as the SPI Model.
 Various other derivative combinations are also available.44
CLOUD SERVICE MODELS ,[object Object]
 Cloud Software as a Service (SaaS).
 Cloud Platform as a Service (PaaS).
 Cloud Infrastructure as a Service (IaaS).45
CLOUD SERVICE MODELS - SaaS ,[object Object]
 Accessed through thin client interface such as a browser.46
CLOUD SERVICE MODELS - SaaS ,[object Object]
 network,
 servers,
 operating systems,
 storage, or
 even individual application capabilities47
CLOUD SERVICE MODELS - SaaS ,[object Object],48
CLOUD SERVICE MODELS - PaaS ,[object Object],49
CLOUD SERVICE MODELS - PaaS ,[object Object]
 network,
 servers,
 operating systems, or
 storage,50
CLOUD SERVICE MODELS - PaaS ,[object Object],51
CLOUD SERVICE MODELS - IaaS ,[object Object]
 processing,
 storage,
 networks, and
 other fundamental computing resources52
CLOUD SERVICE MODELS - IaaS ,[object Object]
 The consumer does not manage or control the underlying cloud infrastructure53
CLOUD SERVICE MODELS - IaaS ,[object Object]
 operating systems,
 storage,
 deployed applications, and
 possibly limited control of select networking components (e.g., host firewalls).54
CLOUD DEPLOYMENT MODELS ,[object Object]
 Public Cloud
 Private Cloud
 Community Cloud
 Hybrid Cloud55
CLOUD DEPLOYMENT MODELS ,[object Object],56
CLOUD DEPLOYMENT MODELS ,[object Object]
 The cloud infrastructure is made available to the general public or a large industry group
 Owned by an organization providing cloud services.57
CLOUD DEPLOYMENT MODELS ,[object Object]
 The cloud infrastructure is operated solely for a single organization.
 It may be managed by the organization or a third party, and may exist on-premises or off-premises.58
CLOUD DEPLOYMENT MODELS ,[object Object]
 The cloud infrastructure is shared by several organizations
 Supports a specific community that has shared concerns59
CLOUD DEPLOYMENT MODELS ,[object Object]
 mission,
 security requirements,
 policy, or
 compliance considerations60
CLOUD DEPLOYMENT MODELS  It may be managed by the: ,[object Object]
 a third party and may exist  ,[object Object]
 off-premises.61
CLOUD DEPLOYMENT MODELS ,[object Object]
 Composition of two or more clouds (private, community, or public)
 They remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability 62
CLOUD DEPLOYMENT MODELS ,[object Object]
 Cloud bursting for load-balancing between clouds.63
CLOUD BURSTING ,[object Object]
 Bursting into the cloud when necessary, or
 using the cloud when additional compute resources are required temporarily64
CLOUD BURSTING ,[object Object]
 How it is done?
 Basic application functionality could be provided from within the cloud65
CLOUD BURSTING ,[object Object],66
CLOUD BURSTING ,[object Object]
 Traditionally been applied to resource allocation and automated provisioning / de-provisioning of resources
 Historically focused on bandwidth.67
CLOUD BURSTING ,[object Object]
 servers,
 application servers,
 application delivery systems, and
 other infrastructure…68
CLOUD BURSTING ,[object Object],69
CLOUD BURSTING ,[object Object]
 We generally call it - automation
 But is automation sufficient for cloud? or is it the right thing for cloud?70
CLOUD ORCHESTRATION  Orchestration describes the automated ,[object Object]
 coordination, and
 management of complex computer systems, middleware, and services. 71
CLOUD ORCHESTRATION ,[object Object]
 Service Oriented Architecture,
 virtualization,
 provisioning, and
 dynamic datacenter topics.72
DERIVATIVE - DEPLOYMENT MODELS ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingEditor IJCATR
 
Cloud computing
Cloud computingCloud computing
Cloud computingsfu-kras
 
Made to measure Cloud
Made to measure CloudMade to measure Cloud
Made to measure Cloudcolinwoods
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stackRishabh Agarwal
 
Impact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoptionImpact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoptionAndreja Pucihar
 
Cloud computing intro
Cloud computing introCloud computing intro
Cloud computing introSridhara T V
 
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta MaggioreServizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta MaggioreApulian ICT Living Labs
 
Advanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingAdvanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingSwwapnil Saali
 
The Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsThe Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsCA API Management
 
Emerging Computing Architectures
Emerging Computing ArchitecturesEmerging Computing Architectures
Emerging Computing ArchitecturesDaniel Holmberg
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationSai P Mishra
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 

Was ist angesagt? (20)

Review on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud ComputingReview on Security Techniques using Cloud Computing
Review on Security Techniques using Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Made to measure Cloud
Made to measure CloudMade to measure Cloud
Made to measure Cloud
 
M commerce
M commerceM commerce
M commerce
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Impact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoptionImpact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoption
 
Cloud computing intro
Cloud computing introCloud computing intro
Cloud computing intro
 
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta MaggioreServizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
 
Advanced Concepts of Cloud Computing
Advanced Concepts of Cloud ComputingAdvanced Concepts of Cloud Computing
Advanced Concepts of Cloud Computing
 
The Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsThe Latest in Cloud Computing Standards
The Latest in Cloud Computing Standards
 
Emerging Computing Architectures
Emerging Computing ArchitecturesEmerging Computing Architectures
Emerging Computing Architectures
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
D32035052
D32035052D32035052
D32035052
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 

Andere mochten auch

ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...Dogs Trust
 
Redefining Literacy in the Emerging Digital Society
Redefining Literacy in the Emerging Digital SocietyRedefining Literacy in the Emerging Digital Society
Redefining Literacy in the Emerging Digital SocietyRamesh C. Sharma
 
Understanding The Digital Revolution July 2014
Understanding The Digital Revolution July 2014Understanding The Digital Revolution July 2014
Understanding The Digital Revolution July 2014Jack Dotchin
 
It security forensic
It security forensicIt security forensic
It security forensicRupesh Verma
 
Digital Media & Society
Digital Media & SocietyDigital Media & Society
Digital Media & Societynylysy
 
The 1st revolution marketing the digital revolution bt.20120606_slide_share2
The 1st revolution marketing the digital revolution bt.20120606_slide_share2The 1st revolution marketing the digital revolution bt.20120606_slide_share2
The 1st revolution marketing the digital revolution bt.20120606_slide_share2Bruno Teboul
 

Andere mochten auch (7)

ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
 
Redefining Literacy in the Emerging Digital Society
Redefining Literacy in the Emerging Digital SocietyRedefining Literacy in the Emerging Digital Society
Redefining Literacy in the Emerging Digital Society
 
Understanding The Digital Revolution July 2014
Understanding The Digital Revolution July 2014Understanding The Digital Revolution July 2014
Understanding The Digital Revolution July 2014
 
Portfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coatPortfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coat
 
It security forensic
It security forensicIt security forensic
It security forensic
 
Digital Media & Society
Digital Media & SocietyDigital Media & Society
Digital Media & Society
 
The 1st revolution marketing the digital revolution bt.20120606_slide_share2
The 1st revolution marketing the digital revolution bt.20120606_slide_share2The 1st revolution marketing the digital revolution bt.20120606_slide_share2
The 1st revolution marketing the digital revolution bt.20120606_slide_share2
 

Ähnlich wie nullcon 2011 - Security and Forensic Discovery in Cloud Environments

Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
IT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxIT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxadad129366
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingSuman Jha
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptA
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloudVan Pham
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloudsree raj
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingRevathi Ram
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptA
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.pptMunmunSaha7
 

Ähnlich wie nullcon 2011 - Security and Forensic Discovery in Cloud Environments (20)

Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
IT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptxIT-35 Cloud Computing Unit 1.pptx
IT-35 Cloud Computing Unit 1.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CLOUD
CLOUDCLOUD
CLOUD
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud
CloudCloud
Cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud
CloudCloud
Cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Cloud notes 1
Cloud notes 1Cloud notes 1
Cloud notes 1
 
cloud computing
cloud computingcloud computing
cloud computing
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 

Mehr von n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

nullcon 2011 - Security and Forensic Discovery in Cloud Environments