Abusing Google Apps and Data API: Google is My Command and Control Center

Ajin Abraham
Ajin AbrahamSecurity Engineer | Freelance Security Consultant | Speaker at IMMUNIO
Abusing Google Apps & Data API

Google is my C2.
#whoami

www.opensecurity.in

Information Security Enthusiast

Founder of OWASP Xenotix XSS Exploit Framework
Strong supporter of Free and Open Information Security
Education.

Runs a DEFCON chapter at Kerala.
Another Leaner.
Abusing Google Apps and Data API: Google is My Command and Control Center
disclaimer
All third party images are the property of their
respective owners.
Just pointing out how some innocent services
can be abused.
I am not responsible for anything.
Agenda
Intro
Abusing AppScript for e-mail bombing
Data URI + Google Forms + TinyURL = Phishing Variant
Google Spreadsheet + DATA API = A Botnet
Communication Channel

xBOT : A prototype Bot
Conclude
Google Data API
Email Bombing: the old ways
Methods of e-bombing
Open Relay servers
PHP/ASP/JSP Mail Functions
Misconfigured Mail Sending features in Web Apps

Now blocked by services like Gmail, Live, Yahoo etc.
E-bombs will end up in SPAM folder.
Google AppScript
Google Apps Script is a JavaScript cloud scripting language.
AppScript : Class MailApp
Little Mutation
DEMO
http://www.youtube.com/watch?v=mTHIc
dkdKXY
Data URI
Data URI Phishing was described by “Henning Klevjer” in his Paper
Data URI allows you to include data in-line in web pages via URL

data:text/html,<body>hi</body>
data:text/html;base64,PGJvZHk+aGk8L2JvZHk+
DATA URI + Google Forms + Tiny URL = Beauty

Combining all these stuff gives a beautiful Phishing Attack.
A Perfect addition to Social Engineering.
Basic Idea
http://tinyurl.com/fb

data:text/html,<body>hi</body>

Google Spreadsheet
credentials

Injected with our JavaScript

FB
Server
JavaScript to do the work
DEMO
http://www.youtube.com/watch?v=htoiN
O50fBc
Channelizing Google SpreadSheet
Google SpreadSheet can store data online.
You can export the contents of the spreadsheet as
json, rss and tsv
Read and Write remotely

SSL Hmmm!
What else you want?
Selecting the right URL format
Execution Time

Data Length
9

600000

8

500000

7
6

400000

5

300000

4
3

200000

2

100000

1
0

0
JSON

RSS
Data Length

TSV

Source

JSON

RSS

TSV

Execution Time

Source
Abusing Google Apps and Data API: Google is My Command and Control Center
What is xBOT?
xBOT is a PoC bot.
Uses Google Spreadsheet and Forms to implement
it’s Communication Channel.
Uses Google DATA API to extract the commands.
Use a third party server for file hosting.
xBOT Architecture
Command and Control
Send
Commands
Google Form

Google Spreadsheet

File URL
Send
Response
File
Upload
File Hosting

xbot.py
xBOT Victim

Get Commands
Every 4 Sec
DEMO
http://www.youtube.com/watch?v=TBP7y
nUalOY
Conclusion
Nasty things can be built over Innocent stuffs.
These are some possible ways an attacker could
use.
Interesting Fact: There is no captcha for Google
Forms.

That’s all
Thank You

@ajinabraham
ajin.abraham@owasp.org
1 of 24

Recommended

Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ... by
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Ajin Abraham
67K views38 slides
Abusing Exploiting and Pwning with Firefox Addons by
Abusing Exploiting and Pwning with Firefox AddonsAbusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAjin Abraham
5.7K views20 slides
Automated Security Analysis of Android & iOS Applications with Mobile Securit... by
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Ajin Abraham
26.1K views24 slides
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF by
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAjin Abraham
23K views38 slides
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S... by
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...Ajin Abraham
10K views18 slides
Qark DefCon 23 by
Qark DefCon 23Qark DefCon 23
Qark DefCon 23☠Tony Trummer☠
10.7K views22 slides

More Related Content

What's hot

Mobile_app_security by
Mobile_app_securityMobile_app_security
Mobile_app_securityHassan El Hadary
970 views37 slides
Approaching the unknown - Windows Phone application security assessment guide by
Approaching the unknown - Windows Phone application security assessment guideApproaching the unknown - Windows Phone application security assessment guide
Approaching the unknown - Windows Phone application security assessment guideSecuRing
564 views44 slides
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Ajin Abraham
8K views53 slides
Security testing in mobile applications by
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applicationsJose Manuel Ortega Candel
1.4K views55 slides
Hacking Tizen: The OS of everything - Whitepaper by
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperAjin Abraham
3.8K views11 slides
Injecting Security into vulnerable web apps at Runtime by
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeAjin Abraham
3K views56 slides

What's hot(20)

Approaching the unknown - Windows Phone application security assessment guide by SecuRing
Approaching the unknown - Windows Phone application security assessment guideApproaching the unknown - Windows Phone application security assessment guide
Approaching the unknown - Windows Phone application security assessment guide
SecuRing564 views
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015 by Ajin Abraham
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham8K views
Hacking Tizen: The OS of everything - Whitepaper by Ajin Abraham
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - Whitepaper
Ajin Abraham3.8K views
Injecting Security into vulnerable web apps at Runtime by Ajin Abraham
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham3K views
API Abuse - The Anatomy of An Attack by Nordic APIs
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
Nordic APIs597 views
Why you need API Security Automation by 42Crunch
Why you need API Security AutomationWhy you need API Security Automation
Why you need API Security Automation
42Crunch174 views
API Security - OWASP top 10 for APIs + tips for pentesters by Inon Shkedy
API Security - OWASP top 10 for APIs + tips for pentestersAPI Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentesters
Inon Shkedy1.1K views
OWASP API Security Top 10 - API World by 42Crunch
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch3.6K views
APISecurity_OWASP_MitigationGuide by Isabelle Mauny
APISecurity_OWASP_MitigationGuide APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
Isabelle Mauny392 views
Injecting Security into Web apps at Runtime Whitepaper by Ajin Abraham
Injecting Security into Web apps at Runtime WhitepaperInjecting Security into Web apps at Runtime Whitepaper
Injecting Security into Web apps at Runtime Whitepaper
Ajin Abraham3.1K views
Attacking android insecurity by Godfrey Nolan
Attacking android insecurityAttacking android insecurity
Attacking android insecurity
Godfrey Nolan1K views
Pentesting Android Applications by Cláudio André
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
Cláudio André8.2K views
[OPD 2019] Inter-application vulnerabilities by OWASP
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
OWASP207 views
The Dev, Sec and Ops of API Security - API World by 42Crunch
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
42Crunch714 views
owasp_meetup_12_10 by sean_todd
owasp_meetup_12_10owasp_meetup_12_10
owasp_meetup_12_10
sean_todd319 views
The Dev, Sec and Ops of API Security - NordicAPIs by 42Crunch
The Dev, Sec and Ops of API Security - NordicAPIsThe Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIs
42Crunch251 views

Viewers also liked

Abusing, Exploiting and Pwning with Firefox Add-ons by
Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-onsAjin Abraham
8.5K views18 slides
Hacking Tizen : The OS of Everything - Nullcon Goa 2015 by
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Ajin Abraham
7K views50 slides
Phishing With Data URI by
Phishing With Data URIPhishing With Data URI
Phishing With Data URIAjin Abraham
2.3K views8 slides
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen... by
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...Ajin Abraham
3.6K views44 slides
Xenotix XSS Exploit Framework: Clubhack 2012 by
Xenotix XSS Exploit Framework: Clubhack 2012 Xenotix XSS Exploit Framework: Clubhack 2012
Xenotix XSS Exploit Framework: Clubhack 2012 Ajin Abraham
3.9K views26 slides
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013 by
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013Ajin Abraham
4.7K views29 slides

Viewers also liked(14)

Abusing, Exploiting and Pwning with Firefox Add-ons by Ajin Abraham
Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-ons
Ajin Abraham8.5K views
Hacking Tizen : The OS of Everything - Nullcon Goa 2015 by Ajin Abraham
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham7K views
Phishing With Data URI by Ajin Abraham
Phishing With Data URIPhishing With Data URI
Phishing With Data URI
Ajin Abraham2.3K views
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen... by Ajin Abraham
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presen...
Ajin Abraham3.6K views
Xenotix XSS Exploit Framework: Clubhack 2012 by Ajin Abraham
Xenotix XSS Exploit Framework: Clubhack 2012 Xenotix XSS Exploit Framework: Clubhack 2012
Xenotix XSS Exploit Framework: Clubhack 2012
Ajin Abraham3.9K views
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013 by Ajin Abraham
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
Ajin Abraham4.7K views
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis by CHOOSE
Dissecting State-of-the-Art Android Malware Using Static and Dynamic AnalysisDissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
CHOOSE 274 views
Shellcoding in linux by Ajin Abraham
Shellcoding in linuxShellcoding in linux
Shellcoding in linux
Ajin Abraham3.4K views
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains by Ajin Abraham
Exploit Research and Development Megaprimer: DEP Bypassing with ROP ChainsExploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Ajin Abraham4.6K views
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing by Stephan Chenette
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
Stephan Chenette3.3K views
H2O.ai - Road Ahead - keynote presentation by Sri Ambati by Sri Ambati
H2O.ai - Road Ahead - keynote presentation by Sri AmbatiH2O.ai - Road Ahead - keynote presentation by Sri Ambati
H2O.ai - Road Ahead - keynote presentation by Sri Ambati
Sri Ambati8.5K views
Top 10 Data Science Practitioner Pitfalls by Sri Ambati
Top 10 Data Science Practitioner PitfallsTop 10 Data Science Practitioner Pitfalls
Top 10 Data Science Practitioner Pitfalls
Sri Ambati3.6K views
Introduction to Data Science with H2O- Mountain View by Sri Ambati
Introduction to Data Science with H2O- Mountain ViewIntroduction to Data Science with H2O- Mountain View
Introduction to Data Science with H2O- Mountain View
Sri Ambati1.6K views

Similar to Abusing Google Apps and Data API: Google is My Command and Control Center

Hi5 Open Social by
Hi5   Open SocialHi5   Open Social
Hi5 Open SocialJulia Foxworthy
490 views27 slides
Personal Work by
Personal WorkPersonal Work
Personal WorkQureshi Tehmina
171 views13 slides
Build APIs With Kapow Mashup Server by
Build APIs With Kapow Mashup ServerBuild APIs With Kapow Mashup Server
Build APIs With Kapow Mashup ServerAndreas Krohn
1.3K views19 slides
Advanced phishing for red team assessments by
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessmentsJEBARAJM
188 views37 slides
Having Fun Building Web Applications (Day 1 Slides) by
Having Fun Building Web Applications (Day 1 Slides)Having Fun Building Web Applications (Day 1 Slides)
Having Fun Building Web Applications (Day 1 Slides)Clarence Ngoh
81 views43 slides
How can a data layer help my seo by
How can a data layer help my seoHow can a data layer help my seo
How can a data layer help my seoPhil Pearce
5.5K views66 slides

Similar to Abusing Google Apps and Data API: Google is My Command and Control Center(20)

Build APIs With Kapow Mashup Server by Andreas Krohn
Build APIs With Kapow Mashup ServerBuild APIs With Kapow Mashup Server
Build APIs With Kapow Mashup Server
Andreas Krohn1.3K views
Advanced phishing for red team assessments by JEBARAJM
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
JEBARAJM188 views
Having Fun Building Web Applications (Day 1 Slides) by Clarence Ngoh
Having Fun Building Web Applications (Day 1 Slides)Having Fun Building Web Applications (Day 1 Slides)
Having Fun Building Web Applications (Day 1 Slides)
Clarence Ngoh81 views
How can a data layer help my seo by Phil Pearce
How can a data layer help my seoHow can a data layer help my seo
How can a data layer help my seo
Phil Pearce5.5K views
Introduction To Open Web Protocols by Mohan Krishnan
Introduction To Open Web ProtocolsIntroduction To Open Web Protocols
Introduction To Open Web Protocols
Mohan Krishnan2.2K views
Rails Girls - Introduction to HTML & CSS by Timo Herttua
Rails Girls - Introduction to HTML & CSSRails Girls - Introduction to HTML & CSS
Rails Girls - Introduction to HTML & CSS
Timo Herttua789 views
The Big Picture and How to Get Started by guest1af57e
The Big Picture and How to Get StartedThe Big Picture and How to Get Started
The Big Picture and How to Get Started
guest1af57e1.6K views
Facebook Messenger Bot with Flask & Google App Engine by Nazrul Kamaruddin
Facebook Messenger Bot with Flask & Google App EngineFacebook Messenger Bot with Flask & Google App Engine
Facebook Messenger Bot with Flask & Google App Engine
Nazrul Kamaruddin2.5K views
The current status of html5 technology and standard by Wonsuk Lee
The current status of html5 technology and standardThe current status of html5 technology and standard
The current status of html5 technology and standard
Wonsuk Lee2.6K views
API Integration in Web Application by ijtsrd
API Integration in Web ApplicationAPI Integration in Web Application
API Integration in Web Application
ijtsrd19 views
Flash SEO Secrets by rtretola
Flash SEO SecretsFlash SEO Secrets
Flash SEO Secrets
rtretola802 views
Building Event-driven Serverless Applications by Amazon Web Services
Building Event-driven Serverless ApplicationsBuilding Event-driven Serverless Applications
Building Event-driven Serverless Applications
Amazon Web Services1.3K views
Barcamphanoi Opensocial Application Development by Hoat Le
Barcamphanoi Opensocial Application DevelopmentBarcamphanoi Opensocial Application Development
Barcamphanoi Opensocial Application Development
Hoat Le4K views

More from Ajin Abraham

Exploit Research and Development Megaprimer: Win32 Egghunter by
Exploit Research and Development Megaprimer: Win32 EgghunterExploit Research and Development Megaprimer: Win32 Egghunter
Exploit Research and Development Megaprimer: Win32 EgghunterAjin Abraham
3.1K views21 slides
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ... by
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...Ajin Abraham
5K views12 slides
Exploit Research and Development Megaprimer: Unicode Based Exploit Development by
Exploit Research and Development Megaprimer: Unicode Based Exploit DevelopmentExploit Research and Development Megaprimer: Unicode Based Exploit Development
Exploit Research and Development Megaprimer: Unicode Based Exploit DevelopmentAjin Abraham
1.9K views14 slides
Exploit Research and Development Megaprimer: Buffer overflow for beginners by
Exploit Research and Development Megaprimer: Buffer overflow for beginnersExploit Research and Development Megaprimer: Buffer overflow for beginners
Exploit Research and Development Megaprimer: Buffer overflow for beginnersAjin Abraham
1.4K views8 slides
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013 by
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013Ajin Abraham
10.3K views6 slides
Wi-Fi Security with Wi-Fi P+ by
Wi-Fi Security with Wi-Fi P+Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+Ajin Abraham
2.4K views6 slides

More from Ajin Abraham(7)

Exploit Research and Development Megaprimer: Win32 Egghunter by Ajin Abraham
Exploit Research and Development Megaprimer: Win32 EgghunterExploit Research and Development Megaprimer: Win32 Egghunter
Exploit Research and Development Megaprimer: Win32 Egghunter
Ajin Abraham3.1K views
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ... by Ajin Abraham
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss ...
Ajin Abraham5K views
Exploit Research and Development Megaprimer: Unicode Based Exploit Development by Ajin Abraham
Exploit Research and Development Megaprimer: Unicode Based Exploit DevelopmentExploit Research and Development Megaprimer: Unicode Based Exploit Development
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Ajin Abraham1.9K views
Exploit Research and Development Megaprimer: Buffer overflow for beginners by Ajin Abraham
Exploit Research and Development Megaprimer: Buffer overflow for beginnersExploit Research and Development Megaprimer: Buffer overflow for beginners
Exploit Research and Development Megaprimer: Buffer overflow for beginners
Ajin Abraham1.4K views
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013 by Ajin Abraham
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Ajin Abraham10.3K views
Wi-Fi Security with Wi-Fi P+ by Ajin Abraham
Wi-Fi Security with Wi-Fi P+Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+
Ajin Abraham2.4K views
Buffer overflow for Beginners by Ajin Abraham
Buffer overflow for BeginnersBuffer overflow for Beginners
Buffer overflow for Beginners
Ajin Abraham948 views

Recently uploaded

Understanding GenAI/LLM and What is Google Offering - Felix Goh by
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
41 views33 slides
Melek BEN MAHMOUD.pdf by
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdfMelekBenMahmoud
14 views1 slide
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze by
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeNUS-ISS
19 views47 slides
Web Dev - 1 PPT.pdf by
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdfgdsczhcet
55 views45 slides
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... by
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...NUS-ISS
28 views70 slides
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV by
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
88 views20 slides

Recently uploaded(20)

Understanding GenAI/LLM and What is Google Offering - Felix Goh by NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS41 views
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze by NUS-ISS
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS19 views
Web Dev - 1 PPT.pdf by gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet55 views
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... by NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS28 views
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV by Splunk
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk88 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada130 views
Spesifikasi Lengkap ASUS Vivobook Go 14 by Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 views
.conf Go 2023 - Data analysis as a routine by Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk93 views
Future of Learning - Khoong Chan Meng by NUS-ISS
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
NUS-ISS33 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 views
Data-centric AI and the convergence of data and model engineering: opportunit... by Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier34 views
Future of Learning - Yap Aye Wee.pdf by NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS41 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb12 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 views
AI: mind, matter, meaning, metaphors, being, becoming, life values by Twain Liu 刘秋艳
AI: mind, matter, meaning, metaphors, being, becoming, life valuesAI: mind, matter, meaning, metaphors, being, becoming, life values
AI: mind, matter, meaning, metaphors, being, becoming, life values
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum... by NUS-ISS
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS34 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
How the World's Leading Independent Automotive Distributor is Reinventing Its... by NUS-ISS
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
NUS-ISS15 views

Abusing Google Apps and Data API: Google is My Command and Control Center