SlideShare ist ein Scribd-Unternehmen logo
1 von 86
Downloaden Sie, um offline zu lesen
CLIMB Workshop
Andrea Telatin, Quadram Institute Biosciences
Working with a
Linux shell
Gut Microbes and Health ISP
Andrea TelatinQuadram GMH Training
from xkcd
Andrea Telatin
๏ Website
• https://seq.space/notes/
๏ Goals
• Day1 — Logging into a remote server
• Day2 — Understanding where are files
• Day3 — Inspecting text files
• Day4 — Testing first bioinformatics tools
Andrea Telatin
๏ Website
• https://seq.space/notes/
๏ Goals
• Day1 — Logging into a remote server
• Day2 — Understanding where are files
• Day3 — Inspecting text files
• Day4 — Testing first bioinformatics tools
Andrea Telatin
๏ Website
• https://seq.space/notes/
๏ Goals
• Day1 — Logging into a remote server
• Day2 — Understanding where are files
• Day3 — Inspecting text files
• Day4 — Testing first bioinformatics tools
NOTE:
Each tutorial is meant to be
finished individually, at your
pace, after the class.
The first two days are tightly
coupled: don’t worry if you
can’t finish today’s tutorial
what is a shell?
Andrea TelatinQuadram GMH Training
The UNIX Terminal
• it’s a powerful text interface to interact with PCs
and servers
• carries a long history of evolution and
improvements from the ‘70
• it’s everywhere: most websites are hosted in a
Linux server. Any Mac runs on UNIX. 

It matters to us: bioinformatics loves Linux.
Andrea TelatinQuadram GMH Training
The shell
• It’s a program that allows us to interact with the
system: list files, run other programs…
• DOS was a shell by Microsoft. We are interested in
UNIX compatible shells, there are many the most
commonly found in servers being Bash
• Bash can replace whatever you are used to do
under Windows with a mouse, and more.
Andrea TelatinQuadram GMH Training
The shell
Andrea TelatinQuadram GMH Training
The shellPrompt
Andrea TelatinQuadram GMH Training
The shellPrompt
Andrea TelatinQuadram GMH Training
The shell
Your command
Prompt
Andrea TelatinQuadram GMH Training
The shell
Your command
Prompt
Andrea TelatinQuadram GMH Training
The shell
Your command
Prompt
Output from the program
Andrea TelatinQuadram GMH Training
The shell
Andrea TelatinQuadram GMH Training
The shell
‣ How many commands are present?
‣ Did some program return no output?
remote servers
Laptop by Edward Boatman from the Noun Project
andrea’s
client
john’s
client
GMH

Server
Laptop by Edward Boatman from the Noun Project
andrea’s
client
john’s
client
GMH

Server
Benefits: servers are…
• shared resources: multiple users can access the same
data (reducing the need and risks of duplications)
• powerful resources: servers carry more computational
power for the same cost of a laptop
• reliable resources: redundant power supply, redundant
disks. Higher availability and data is more secure
• managed resources: we don’t need to remember to
backup our data, someone else will.
Andrea TelatinQuadram GMH Training
Connecting to a remote server
➡ From Linux or OS X
• Open your terminal
• Type ssh remoteuser@remoteaddress
➡ From Windows
• You need a free terminal emulator called
PuTTY (4ngs.com/go/hG)
Andrea TelatinQuadram GMH Training
Connecting to a remote server
➡ From Linux or OS X
• Open your terminal
• Type ssh remoteuser@remoteaddress
➡ From Windows
• You need a free terminal emulator called
PuTTY (4ngs.com/go/hG)
Andrea TelatinQuadram GMH Training
Connecting to a remote server
➡ From Linux or OS X
• Open your terminal
• Type ssh remoteuser@remoteaddress
➡ From Windows
• You need a free terminal emulator called
PuTTY (4ngs.com/go/hG)
Andrea TelatinQuadram GMH Training
Connecting to a remote server
➡ From Linux or OS X
• Open your terminal
• Type ssh remoteuser@remoteaddress
➡ From Windows
• You need a free terminal emulator called
PuTTY (4ngs.com/go/hG)
putty.exe
1
2
ubuntu@137.44.55.66
Quadram Workshop
3
4
putty.exe
Andrea TelatinQuadram GMH Training
Connecting to a remote server
• When typing password inside a terminal you
won’t see anything! Just type then hit enter!
• The first time you access to a remote server
you’ll be asked if you trust it (message in the
terminal or windows from PuTTY)
Andrea TelatinQuadram GMH Training
Connecting to a remote server
• Once logged into the remote server you’ll only
be able to see the files present there
• It’s possible to copy files from your local
machine (client) to the remote machine
(server)
• It’s a good idea to always use some server for
our work: clients are never as safe and reliable
as a server.
“screen” safety net
andrea’s client
GMH

Server$ command
SSH Session: a constant flow of text going to
and coming from the remote server
andrea’s client
GMH

Server
Even a small interruption in the connectivity
will make the server assume we are no longer interested!
andrea’s client
GMH

Server
We can use a program called screen to keep
the session alive even if we close our computer!
andrea’s client
GMH

Server
We can use a program called screen to keep
the session alive even if we close our computer!
Andrea TelatinQuadram GMH Training
The “screen cycle”
• Check if there are screens already

screen -list
• Resume the existing screen (if present)

screen -dr
• Create a new screen otherwise

screen -S SessionName
File Paths
a.k.a. the most difficult topic of this course!
Andrea TelatinQuadram GMH Training
Concepts
• Current directory, or working directory, is the
place you are currently operating from. You always
are operating from a specific directory.
• Each file has a unique position in the filesystem
tree (like a leaf in a taxonomy tree). You can
describe it in two ways: absolute or relative.
Andrea TelatinQuadram GMH Training
Concepts
• Absolute paths, like absolute coordinates, are the
same for any user of the system, no matter the
current working directory. They always start with /
• Relative paths are generated assuming your
working directory as the starting point. They never
start with /.
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
cd Proch
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
cd Proch cd /home/Proch
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
Proch/
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
Proch/
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
Proch/
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
Proch/
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
ls -l ../Lizzy/linux.pdf
Proch/
/
home/
etc/
tmp/
usr/ bin/
Proch/
Lizzy/
my_file.txt

linux.pdf
perl
report.txt

linux.pdf
Working Dir
. Current directory
.. Upper directory

~ Home directory
ls -l ../Lizzy/linux.pdf
Proch/
Andrea TelatinQuadram GMH Training
Commands history
• Using the up arrow you will recall the last command
typed, hit it again and you get the previous and so
on.
• Down arrow is working as well
• The command history will

print the list of commands

issued so far
Andrea TelatinQuadram GMH Training
Commands history
• Using the up arrow you will recall the last command
typed, hit it again and you get the previous and so
on.
• Down arrow is working as well
• The command history will

print the list of commands

issued so far
Andrea TelatinQuadram GMH Training
Tab completion
• When you are typing a file path (relative or absolute)
you are likely to introduce errors.
• Most shells have a key (Tab) to help you type a
correct path.
• It’s thus mandatory to use the autocompletion
Andrea TelatinQuadram GMH Training
Tab completion
• When you are typing a file path (relative or absolute)
you are likely to introduce errors.
• Most shells have a key (Tab) to help you type a
correct path.
• It’s thus mandatory to use the autocompletion
Panic management
• Breaks current work (exit)
• After killing the current process, you’ll get the prompt
back
• Also remember that Ctrl + D breaks a stream of data
Panic management
• Breaks current work (exit)
• After killing the current process, you’ll get the prompt
back
• Also remember that Ctrl + D breaks a stream of data
Anatomy of a command
Andrea TelatinQuadram GMH Training
Structure of a command
• command parameters …
• ls -l /workshop
• grep -c ">" file-name.txt
Andrea TelatinQuadram GMH Training
Structure of a command
• command parameters …
• ls -l /workshop
• grep -c ">" file-name.txt
Andrea TelatinQuadram GMH Training
Structure of a command
• command parameters …
• ls -l /workshop
• grep -c ">" file-name.txt
Andrea TelatinQuadram GMH Training
Structure of a command
• command parameters …
• ls -l /workshop
• grep -c ">" file-name.txt
Andrea TelatinQuadram GMH Training
Structure of a command
• command parameters …
• ls -l /workshop
• grep -c ">" file-name.txt
Andrea TelatinQuadram GMH Training
Structure of a command
• command parameters …
• ls -l /workshop
• grep -c ">" file-name.txt
Andrea TelatinQuadram GMH Training
Structure of a command
• command parameters …
• ls -l /workshop
• grep -c ">" file-name.txt
Example: 4ngs.com/go/hH
Andrea TelatinQuadram GMH Training
Structure of a command
• command parameters …
• ls -l /workshop
• grep -c ">" file-name.txt
Example: 4ngs.com/go/hH
Redirection and
pipes
Andrea TelatinQuadram GMH Training
Redirection
• Programs often print some text on our terminal. If
we want we can redirect that text from the terminal
to a file (i.e. save to a file the output)

• ls -l > my_list.txt

find / > all_files.txt 2> errors.log
Andrea TelatinQuadram GMH Training
Piping commands
• A method to create a flow of data: the output of the
upstream command becomes the input of the
downstream program. We will see this later.

• find ~ | wc -l
Some commands
Andrea TelatinQuadram GMH Training
Where am I: pwd
• Means “print working directory”, no parameters to
be supplied.
• It returns the absolute path of our current position
• It’s important to check if we are where we think we
are (see also ls)
Andrea TelatinQuadram GMH Training
Change directory: cd
• cd (Change directory) allows to set a new current
directory
• Syntax: cd new_path
• Path can be absolute:

/home/telatin/Desktop/directory/
• or relative:

../../destination
Andrea TelatinQuadram GMH Training
Change directory: cd
• Without parameters goes to the home directory

E.g.: cd
• There is a shortcut for the home directory: ~ 

E.g.: cd ~/Desktop/
• Returning to the previous working directory:

cd -
Andrea TelatinQuadram GMH Training
List files: ls
• “ls” (list) it’s a very important command, as it
replace the common file windows.
• ls alone lists the file in my working directory
• As argument I can give one or more directory,
and “ls” will print their content (e.g.: ls /tmp)
• Also files can be arguments, also with wildcards

e.g.: ls *.fa *.fastq

Andrea TelatinQuadram GMH Training
• Switches can be combined (-l -a = -la)
• -l detailed list
• -a includes hidden files
• -h file size given in human readable format
• man ls detailed manual
• How can I sort by date? OR by size?
List files: ls
Andrea TelatinQuadram GMH Training
Wildcards
• ? substitutes a single character
• * substitutes any string of characters
• Examples: 

ls *.fastq

ls *_R?_*.fastq
Andrea TelatinQuadram GMH Training
Characters range
• [a-z] single lowercase letter
• [A-Z] single uppercase letter
• [0-9] single digit
• E.g.: ls *_R[1-2]_*.fastq
Andrea TelatinQuadram GMH Training
Copy a file cp
• Syntax: cp [origin] [destination]
• Origin can be one or more files.
• -r to recursively copy directories and their content
• man cp as always…
Andrea TelatinQuadram GMH Training
Create directories mkdir
• Syntax: mkdir [newDirName] …
• -p to create intermediate directories if necessary:

mkdir -p day1/data/sample
• man mkdir for further details
Andrea TelatinQuadram GMH Training
Remove directories rmdir
• Syntax: rmdir [DirName] …
• Only removes empty directories (safe)
• man rmdir
Andrea TelatinQuadram GMH Training
• Syntax: rm [file] …
• Removes files, not directories, by default
• -r also removes directories and their content (😵)
• Careful with this one, it hurts!
Delete files rm
How to do it the right way
Before running a dangerous command

eg: rm ./files/*.gz
TEST it with an “ls”
e.g.: ls ./files/*.gz
Andrea TelatinQuadram GMH Training
• Syntax: cat [file1] [file2]…
• Will print all the content of one or multiple text files
• If the file is very long… can be a problem!
View text files cat
Andrea TelatinQuadram GMH Training
• Syntax: head [file1] [file2]…
• Will print the first ten lines of a file
• head -n 16 [file1] [file2]…
• Similarily, tail will print the last lines
head and tail
Andrea TelatinQuadram GMH Training
• Syntax: man command
• Manual for shell commands
• You can scroll with arrow keys and quit with q
• g and G to quickly reach the top/bottom
• / to start searching
• n N to go to the next / previous occurrence
man
Andrea TelatinQuadram GMH Training
• Syntax: less [file1]
• An interactive viewer of text files. You can scroll
with arrow keys and quit with q. Works like man!
• To prevent word wrap:
• less -S [file1]
less
Andrea TelatinQuadram GMH Training
wc: word count
lines, words, characters
Andrea TelatinQuadram GMH Training
wc: word count
lines, words, characters

Weitere ähnliche Inhalte

Was ist angesagt?

Invoke-Obfuscation nullcon 2017
Invoke-Obfuscation nullcon 2017Invoke-Obfuscation nullcon 2017
Invoke-Obfuscation nullcon 2017Daniel Bohannon
 
Package manages and Puppet - PuppetConf 2015
Package manages and Puppet - PuppetConf 2015Package manages and Puppet - PuppetConf 2015
Package manages and Puppet - PuppetConf 2015ice799
 
Cfgmgmt Challenges aren't technical anymore
Cfgmgmt Challenges aren't technical anymoreCfgmgmt Challenges aren't technical anymore
Cfgmgmt Challenges aren't technical anymoreJulien Pivotto
 
Infrastructure as code might be literally impossible part 2
Infrastructure as code might be literally impossible part 2Infrastructure as code might be literally impossible part 2
Infrastructure as code might be literally impossible part 2ice799
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shellNikhil Mittal
 
Infrastructure as code might be literally impossible
Infrastructure as code might be literally impossibleInfrastructure as code might be literally impossible
Infrastructure as code might be literally impossibleice799
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Chris Gates
 
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot Tech Talk #10 — Practical automation by Kamil CholewińskiPilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot Tech Talk #10 — Practical automation by Kamil CholewińskiPilot
 
Design Reviewing The Web
Design Reviewing The WebDesign Reviewing The Web
Design Reviewing The Webamiable_indian
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon chinaPeter Hlavaty
 
Who’s afraid of WinDbg
Who’s afraid of WinDbgWho’s afraid of WinDbg
Who’s afraid of WinDbgDror Helper
 
DevSecCon London 2017 - MacOS security, hardening and forensics 101 by Ben Hu...
DevSecCon London 2017 - MacOS security, hardening and forensics 101 by Ben Hu...DevSecCon London 2017 - MacOS security, hardening and forensics 101 by Ben Hu...
DevSecCon London 2017 - MacOS security, hardening and forensics 101 by Ben Hu...DevSecCon
 
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectRainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectPeter Hlavaty
 
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
A Battle Against the Industry - Beating Antivirus for Meterpreter and MoreA Battle Against the Industry - Beating Antivirus for Meterpreter and More
A Battle Against the Industry - Beating Antivirus for Meterpreter and MoreCTruncer
 
Crash dump analysis - experience sharing
Crash dump analysis - experience sharingCrash dump analysis - experience sharing
Crash dump analysis - experience sharingJames Hsieh
 
Incident Resolution as Code
Incident Resolution as CodeIncident Resolution as Code
Incident Resolution as CodeJulien Pivotto
 
Velocity 2015 building self healing systems (slide share version)
Velocity 2015 building self healing systems (slide share version)Velocity 2015 building self healing systems (slide share version)
Velocity 2015 building self healing systems (slide share version)SOASTA
 
Life Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
Life Cycle of Metrics, Alerting, and Performance Monitoring in MicroservicesLife Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
Life Cycle of Metrics, Alerting, and Performance Monitoring in MicroservicesSean Chittenden
 
OSDC 2016 - Continous Integration in Data Centers - Further 3 Years later by ...
OSDC 2016 - Continous Integration in Data Centers - Further 3 Years later by ...OSDC 2016 - Continous Integration in Data Centers - Further 3 Years later by ...
OSDC 2016 - Continous Integration in Data Centers - Further 3 Years later by ...NETWAYS
 

Was ist angesagt? (20)

Invoke-Obfuscation nullcon 2017
Invoke-Obfuscation nullcon 2017Invoke-Obfuscation nullcon 2017
Invoke-Obfuscation nullcon 2017
 
Package manages and Puppet - PuppetConf 2015
Package manages and Puppet - PuppetConf 2015Package manages and Puppet - PuppetConf 2015
Package manages and Puppet - PuppetConf 2015
 
Cfgmgmt Challenges aren't technical anymore
Cfgmgmt Challenges aren't technical anymoreCfgmgmt Challenges aren't technical anymore
Cfgmgmt Challenges aren't technical anymore
 
Infrastructure as code might be literally impossible part 2
Infrastructure as code might be literally impossible part 2Infrastructure as code might be literally impossible part 2
Infrastructure as code might be literally impossible part 2
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shell
 
Infrastructure as code might be literally impossible
Infrastructure as code might be literally impossibleInfrastructure as code might be literally impossible
Infrastructure as code might be literally impossible
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
 
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot Tech Talk #10 — Practical automation by Kamil CholewińskiPilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
 
Design Reviewing The Web
Design Reviewing The WebDesign Reviewing The Web
Design Reviewing The Web
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon china
 
Who’s afraid of WinDbg
Who’s afraid of WinDbgWho’s afraid of WinDbg
Who’s afraid of WinDbg
 
DevSecCon London 2017 - MacOS security, hardening and forensics 101 by Ben Hu...
DevSecCon London 2017 - MacOS security, hardening and forensics 101 by Ben Hu...DevSecCon London 2017 - MacOS security, hardening and forensics 101 by Ben Hu...
DevSecCon London 2017 - MacOS security, hardening and forensics 101 by Ben Hu...
 
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectRainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could Expect
 
North east user group tour
North east user group tourNorth east user group tour
North east user group tour
 
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
A Battle Against the Industry - Beating Antivirus for Meterpreter and MoreA Battle Against the Industry - Beating Antivirus for Meterpreter and More
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
 
Crash dump analysis - experience sharing
Crash dump analysis - experience sharingCrash dump analysis - experience sharing
Crash dump analysis - experience sharing
 
Incident Resolution as Code
Incident Resolution as CodeIncident Resolution as Code
Incident Resolution as Code
 
Velocity 2015 building self healing systems (slide share version)
Velocity 2015 building self healing systems (slide share version)Velocity 2015 building self healing systems (slide share version)
Velocity 2015 building self healing systems (slide share version)
 
Life Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
Life Cycle of Metrics, Alerting, and Performance Monitoring in MicroservicesLife Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
Life Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
 
OSDC 2016 - Continous Integration in Data Centers - Further 3 Years later by ...
OSDC 2016 - Continous Integration in Data Centers - Further 3 Years later by ...OSDC 2016 - Continous Integration in Data Centers - Further 3 Years later by ...
OSDC 2016 - Continous Integration in Data Centers - Further 3 Years later by ...
 

Ähnlich wie First adventure within a shell - Andrea Telatin at Quadram Institute

The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingCTruncer
 
Crikeycon 2019 Velociraptor Workshop
Crikeycon 2019 Velociraptor WorkshopCrikeycon 2019 Velociraptor Workshop
Crikeycon 2019 Velociraptor WorkshopVelocidex Enterprises
 
Ever Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the WildEver Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the WildCTruncer
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsShakacon
 
Scientific Computing - Hardware
Scientific Computing - HardwareScientific Computing - Hardware
Scientific Computing - Hardwarejalle6
 
Advanced windows debugging
Advanced windows debuggingAdvanced windows debugging
Advanced windows debuggingchrisortman
 
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue TeamersGo Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamersjasonjfrank
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidMatthew Johnson
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessEC-Council
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 
Gearman - Northeast PHP 2012
Gearman - Northeast PHP 2012Gearman - Northeast PHP 2012
Gearman - Northeast PHP 2012Mike Willbanks
 
Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005dflexer
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleNCC Group
 
NGINX Installation and Tuning
NGINX Installation and TuningNGINX Installation and Tuning
NGINX Installation and TuningNGINX, Inc.
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface DevicePositive Hack Days
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...Zoltan Balazs
 
Sticky Keys to the Kingdom
Sticky Keys to the KingdomSticky Keys to the Kingdom
Sticky Keys to the KingdomDennis Maldonado
 
Gearman: A Job Server made for Scale
Gearman: A Job Server made for ScaleGearman: A Job Server made for Scale
Gearman: A Job Server made for ScaleMike Willbanks
 
Linux Server Deep Dives (DrupalCon Amsterdam)
Linux Server Deep Dives (DrupalCon Amsterdam)Linux Server Deep Dives (DrupalCon Amsterdam)
Linux Server Deep Dives (DrupalCon Amsterdam)Amin Astaneh
 

Ähnlich wie First adventure within a shell - Andrea Telatin at Quadram Institute (20)

The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while Persisting
 
Crikeycon 2019 Velociraptor Workshop
Crikeycon 2019 Velociraptor WorkshopCrikeycon 2019 Velociraptor Workshop
Crikeycon 2019 Velociraptor Workshop
 
Ever Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the WildEver Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the Wild
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 
Scientific Computing - Hardware
Scientific Computing - HardwareScientific Computing - Hardware
Scientific Computing - Hardware
 
Advanced windows debugging
Advanced windows debuggingAdvanced windows debugging
Advanced windows debugging
 
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue TeamersGo Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Gearman - Northeast PHP 2012
Gearman - Northeast PHP 2012Gearman - Northeast PHP 2012
Gearman - Northeast PHP 2012
 
Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
NGINX Installation and Tuning
NGINX Installation and TuningNGINX Installation and Tuning
NGINX Installation and Tuning
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
 
Sticky Keys to the Kingdom
Sticky Keys to the KingdomSticky Keys to the Kingdom
Sticky Keys to the Kingdom
 
Gearman: A Job Server made for Scale
Gearman: A Job Server made for ScaleGearman: A Job Server made for Scale
Gearman: A Job Server made for Scale
 
Linux Server Deep Dives (DrupalCon Amsterdam)
Linux Server Deep Dives (DrupalCon Amsterdam)Linux Server Deep Dives (DrupalCon Amsterdam)
Linux Server Deep Dives (DrupalCon Amsterdam)
 

Mehr von Andrea Telatin

Next Generation Sequencing revolution (February 2010 - PhD retreat)
Next Generation Sequencing revolution (February 2010 - PhD retreat)Next Generation Sequencing revolution (February 2010 - PhD retreat)
Next Generation Sequencing revolution (February 2010 - PhD retreat)Andrea Telatin
 
A primer on microbial diversity: 16S Amplicons analysis
A primer on microbial diversity: 16S Amplicons analysisA primer on microbial diversity: 16S Amplicons analysis
A primer on microbial diversity: 16S Amplicons analysisAndrea Telatin
 
Flash introduction to Qiime2 -- 16S Amplicon analysis
Flash introduction to Qiime2 -- 16S Amplicon analysisFlash introduction to Qiime2 -- 16S Amplicon analysis
Flash introduction to Qiime2 -- 16S Amplicon analysisAndrea Telatin
 
Sequenziamento ed assemblaggio di genomi batterici
Sequenziamento ed assemblaggio di genomi battericiSequenziamento ed assemblaggio di genomi batterici
Sequenziamento ed assemblaggio di genomi battericiAndrea Telatin
 
Laboratorio di Biologia Molecolare I - UniPD - 2010
Laboratorio di Biologia Molecolare I - UniPD - 2010Laboratorio di Biologia Molecolare I - UniPD - 2010
Laboratorio di Biologia Molecolare I - UniPD - 2010Andrea Telatin
 
Uno sguardo al microbioma degli Italiani
Uno sguardo al microbioma degli ItalianiUno sguardo al microbioma degli Italiani
Uno sguardo al microbioma degli ItalianiAndrea Telatin
 
PHP 7.0 new features (and new interpreter)
PHP 7.0 new features (and new interpreter)PHP 7.0 new features (and new interpreter)
PHP 7.0 new features (and new interpreter)Andrea Telatin
 
Target Enrichment with NGS: Cardiomyopathy as a case study - BMR Genomics
Target Enrichment with NGS: Cardiomyopathy as a case study - BMR GenomicsTarget Enrichment with NGS: Cardiomyopathy as a case study - BMR Genomics
Target Enrichment with NGS: Cardiomyopathy as a case study - BMR GenomicsAndrea Telatin
 
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...Andrea Telatin
 
Bioinformatica: Leggere file con Perl, e introduzione alle espressioni regola...
Bioinformatica: Leggere file con Perl, e introduzione alle espressioni regola...Bioinformatica: Leggere file con Perl, e introduzione alle espressioni regola...
Bioinformatica: Leggere file con Perl, e introduzione alle espressioni regola...Andrea Telatin
 
Bioinformatica: introduzione (BMR Genomics) - Lezione 25 luglio 2014
Bioinformatica: introduzione (BMR Genomics) - Lezione 25 luglio 2014Bioinformatica: introduzione (BMR Genomics) - Lezione 25 luglio 2014
Bioinformatica: introduzione (BMR Genomics) - Lezione 25 luglio 2014Andrea Telatin
 
Introduzione al Perl (BMR Genomics) - Lezione 1 Agosto 2014
Introduzione al Perl (BMR Genomics) - Lezione 1 Agosto 2014Introduzione al Perl (BMR Genomics) - Lezione 1 Agosto 2014
Introduzione al Perl (BMR Genomics) - Lezione 1 Agosto 2014Andrea Telatin
 
Introduction to 16S Analysis with NGS - BMR Genomics
Introduction to 16S Analysis with NGS - BMR GenomicsIntroduction to 16S Analysis with NGS - BMR Genomics
Introduction to 16S Analysis with NGS - BMR GenomicsAndrea Telatin
 

Mehr von Andrea Telatin (13)

Next Generation Sequencing revolution (February 2010 - PhD retreat)
Next Generation Sequencing revolution (February 2010 - PhD retreat)Next Generation Sequencing revolution (February 2010 - PhD retreat)
Next Generation Sequencing revolution (February 2010 - PhD retreat)
 
A primer on microbial diversity: 16S Amplicons analysis
A primer on microbial diversity: 16S Amplicons analysisA primer on microbial diversity: 16S Amplicons analysis
A primer on microbial diversity: 16S Amplicons analysis
 
Flash introduction to Qiime2 -- 16S Amplicon analysis
Flash introduction to Qiime2 -- 16S Amplicon analysisFlash introduction to Qiime2 -- 16S Amplicon analysis
Flash introduction to Qiime2 -- 16S Amplicon analysis
 
Sequenziamento ed assemblaggio di genomi batterici
Sequenziamento ed assemblaggio di genomi battericiSequenziamento ed assemblaggio di genomi batterici
Sequenziamento ed assemblaggio di genomi batterici
 
Laboratorio di Biologia Molecolare I - UniPD - 2010
Laboratorio di Biologia Molecolare I - UniPD - 2010Laboratorio di Biologia Molecolare I - UniPD - 2010
Laboratorio di Biologia Molecolare I - UniPD - 2010
 
Uno sguardo al microbioma degli Italiani
Uno sguardo al microbioma degli ItalianiUno sguardo al microbioma degli Italiani
Uno sguardo al microbioma degli Italiani
 
PHP 7.0 new features (and new interpreter)
PHP 7.0 new features (and new interpreter)PHP 7.0 new features (and new interpreter)
PHP 7.0 new features (and new interpreter)
 
Target Enrichment with NGS: Cardiomyopathy as a case study - BMR Genomics
Target Enrichment with NGS: Cardiomyopathy as a case study - BMR GenomicsTarget Enrichment with NGS: Cardiomyopathy as a case study - BMR Genomics
Target Enrichment with NGS: Cardiomyopathy as a case study - BMR Genomics
 
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
 
Bioinformatica: Leggere file con Perl, e introduzione alle espressioni regola...
Bioinformatica: Leggere file con Perl, e introduzione alle espressioni regola...Bioinformatica: Leggere file con Perl, e introduzione alle espressioni regola...
Bioinformatica: Leggere file con Perl, e introduzione alle espressioni regola...
 
Bioinformatica: introduzione (BMR Genomics) - Lezione 25 luglio 2014
Bioinformatica: introduzione (BMR Genomics) - Lezione 25 luglio 2014Bioinformatica: introduzione (BMR Genomics) - Lezione 25 luglio 2014
Bioinformatica: introduzione (BMR Genomics) - Lezione 25 luglio 2014
 
Introduzione al Perl (BMR Genomics) - Lezione 1 Agosto 2014
Introduzione al Perl (BMR Genomics) - Lezione 1 Agosto 2014Introduzione al Perl (BMR Genomics) - Lezione 1 Agosto 2014
Introduzione al Perl (BMR Genomics) - Lezione 1 Agosto 2014
 
Introduction to 16S Analysis with NGS - BMR Genomics
Introduction to 16S Analysis with NGS - BMR GenomicsIntroduction to 16S Analysis with NGS - BMR Genomics
Introduction to 16S Analysis with NGS - BMR Genomics
 

Kürzlich hochgeladen

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Kürzlich hochgeladen (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

First adventure within a shell - Andrea Telatin at Quadram Institute