SlideShare a Scribd company logo
1 of 85
Download to read offline
DDoS Attacks
&&
Booters
[Guest Lecture]
Jair Santanna
jairsantanna.com
j.j.santanna@utwente.nl
09/09/2015
To whom is addressed this presentation…
First of all…
My Goal…
Requirement…
What do you think is a Sniffer?
WIRESHARK
https://www.wireshark.org/download.html
*sudo apt-get install tcpdump
*sudo port install tcpdump
"Promiscuous Mode"
Ethernet
InternetProtocol(IP)
TransportProtocol(TCP,UDP)
Application(ex.HTTP)
Some basic concepts…
Content!!!!
Steps:
1) Start sniffing
2) Open a website
3) Discover the IP
address using a
CMD or a terminal
(host “website”)
4) Create a filter
on Wireshark
(ip.addr == “website_IP")
Example…
zoom-in…
Denial of Service
DoS
Time to make hands dirty!!!
http://sourceforge.net/projects/loic/files/latest/download
http://sourceforge.net/projects/javaloic/files/latest/download
OR
PLUS!
Distributed Denial of Service
DDoS
Direct Attacks
Indirect Attacks
Reflected Attacks
Request
ResponseServer Client
J
Amplification
=A x
Client-Server
ResponseServer Client
J
Request
Spoofed
Reflection and Amplification
Client
“J"
How much traffic can be generated using my
home connection and 100 BitTorrent servers?
[theoretically]
https://en.wikipedia.org/wiki/Denial-of-service_attack
http://www.speedtest.net/
4,14 Mbps * [4 ; 54,3] * 100
[1.656 ; 22.480,2] Mbps
[1,6 ; 22] Gbps
(÷1024)
2014: 400Gbps (NTP)
2013: 300Gbps (DNS)
2020:
.
.
.
1Tbps!?
Hacker
Who?
Anyone!
Booter (Black)List
284 Booter domain names
111 online Booters
Attack Analyses
14 Booters
Hired, Collected, and Analysed
UDP-based
# Booter URL
Offer
[Gbps]
1 boo ?
2 res 5
3 ano 5
4 des 25
5 fla ?
6 dej 10
7 reb Up to 3
8 gri 6
9 qua 1,5
10 oly Up to 3
11 ebo ?
12 vdo ?
13 resp 8
14 oni ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,35
3 reasons!
res oni
3 1
oly vdo ebo
1
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
# Booter URL
Offer
[Gbps]
1 boo ?
2 res 5
3 ano 5
4 des 25
5 fla ?
6 dej 10
7 reb Up to 3
8 gri 6
9 qua 1,5
10 oly Up to 3
11 ebo ?
12 vdo ?
13 resp 8
14 oni ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
Protocol
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
Request
ddostheinter.net
anonsc.com
anonsc.com
root-server.net
-
packetdevil.com
-
root-server.net
root-server.net
dig @8.8.8.8 -t ANY packetdevil.com
dig @8.8.8.8 -t ANY root-server.net
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
DNS-based attacks
root-server.net
anonsc.com
ddostheinter.net
packetdevil.com
dig @8.8.8.8 -t ANY packetdevil.com
dig -t ANY packetdevil.com
dig @8.8.8.8 -t ANY root-server.netVRS
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
CharGen-based attacks
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
# Booter URL
Offer
[Gbps]
1 http://booter.tw ?
2 http://restricted-stresser.info 5
3 http://anonymous-stresser.net 5
4 http://destressbooter.com 25
5 http://flashstresser.net ?
6 http://dejabooter.com 10
7 http://rebel-security.com Up to 3
8 http://grimboot.com 6
9 http://quantumbooter.net 1,5
10 http://olympusstresser.org Up to 3
11 http://ebooter.5gbfree.com ?
12 http://vdoss.net ?
13 http://respawn.ca 8
14 http://onionstresser.com ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,35
Unique IPs
8281
7369
6075
4486
3779
2970
281
78
54
Protocol
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
8280
http://booter.tw http://restricted-stresser.info
7369
http://anonymous-stresser.net
6075
http://destressbooter.com
4486
http://flashstresser.net
3779
http://dejabooter.com
2970
http://rebel-security.com
281
http://grimboot.com
78
http://quantumbooter.net
*54
98%
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
# Booter URL
Offer
[Gbps]
1 http://booter.tw ?
2 http://restricted-stresser.info 5
3 http://anonymous-stresser.net 5
4 http://destressbooter.com 25
5 http://flashstresser.net ?
6 http://dejabooter.com 10
7 http://rebel-security.com Up to 3
8 http://grimboot.com 6
9 http://quantumbooter.net 1,5
10 http://olympusstresser.org Up to 3
11 http://ebooter.5gbfree.com ?
12 http://vdoss.net ?
13 http://respawn.ca 8
14 http://onionstresser.com ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,35
Unique IPs
8281
7369
6075
4486
3779
2970
281
78
54
Protocol
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
29x
# Booter URL
Offer
[Gbps]
1 http://booter.tw ?
2 http://restricted-stresser.info 5
3 http://anonymous-stresser.net 5
4 http://destressbooter.com 25
5 http://flashstresser.net ?
6 http://dejabooter.com 10
7 http://rebel-security.com Up to 3
8 http://grimboot.com 6
9 http://quantumbooter.net 1,5
10 http://olympusstresser.org Up to 3
11 http://ebooter.5gbfree.com ?
12 http://vdoss.net ?
13 http://respawn.ca 8
14 http://onionstresser.com ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,35
Unique IPs
8281
7369
6075
4486
3779
2970
281
78
54
Protocol
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
9427x
Database Analyses
Example: http://pastebin.com/7CZBKXVL
15 Databases
Trust??!!!
Timeline
Domain Registration
Domaintools
DNSDB
First attack
Passive DNS
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Generic schema
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
User
Cu$tomer
Attacker
User
Cu$tomer
Attacker
User
Customer
Attacker
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
PhD Life!
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
Payment Systems
Mohammad Karami, Youngsam Park, Damon McCoy. Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services. arXiv:1508.03410
DDoS Protection
Services
https://www.youtube.com/watch?v=Wr-
PrSqI16A&list=PLiq_fDYFoqMocM7ADQCTfGAdI9CXA-kUs 46:55-47:42
Showing [again] the
Matrix[if time]
DOWNLOAD…
+
DDoS Attacks
&&
Booters
[Guest Lecture]
Jair Santanna
jairsantanna.com
j.j.santanna@utwente.nl
09/09/2015
assignment:
How much network traffic a computer using your residential connection can
generate with 100 DNS servers as amplifiers?
- Print screen of your Internet SpeedTest;
- The amplification factor interval of DNS servers (considering DNSsec);
- The calculation and the result;
Who are the top 10 amplifier that sent more traffic?
- Choose on of the DNS-based attack available in http://www.simpleweb.org/
wiki/Traces#Booters_-_An_analysis_of_DDoS-as-a-Service_Attacks;
- Describe step-by-step how did you find the top 10 amplifiers using
Wireshark or TCPdump;
- Which DNS request was used in this attack;
- Where those top 10 amplifiers are located? (use https://
www.maxmind.com);

More Related Content

Similar to 20150909_cybercrime_cybersecurity_minor

20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair SantannaUniversity of Twente
 
Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8guest441c58b71
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsA Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsIRJET Journal
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsJ On The Beach
 
AusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATAusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATMark Smith
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
network security / information security
network security / information securitynetwork security / information security
network security / information securityRohan Choudhari
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon
 
DDos, Peering, Automation and more
DDos, Peering, Automation and moreDDos, Peering, Automation and more
DDos, Peering, Automation and moreInternet Society
 
Sandbox kiev
Sandbox kievSandbox kiev
Sandbox kievuisgslide
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web SystemsInnoTech
 
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...CODE BLUE
 
What You Need to Know About Web App Security Testing in 2018
What You Need to Know About Web App Security Testing in 2018What You Need to Know About Web App Security Testing in 2018
What You Need to Know About Web App Security Testing in 2018Ken DeSouza
 
Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view IPv6 Conference
 

Similar to 20150909_cybercrime_cybersecurity_minor (20)

20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna
 
Itech 1005
Itech 1005Itech 1005
Itech 1005
 
Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsA Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
 
Thamim
ThamimThamim
Thamim
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
AusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATAusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NAT
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
 
DDos, Peering, Automation and more
DDos, Peering, Automation and moreDDos, Peering, Automation and more
DDos, Peering, Automation and more
 
Sandbox kiev
Sandbox kievSandbox kiev
Sandbox kiev
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
 
What You Need to Know About Web App Security Testing in 2018
What You Need to Know About Web App Security Testing in 2018What You Need to Know About Web App Security Testing in 2018
What You Need to Know About Web App Security Testing in 2018
 
Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view
 

More from University of Twente

Meeting Towards Collaboration for DDoS Attack Mitigation
Meeting Towards Collaboration for DDoS Attack MitigationMeeting Towards Collaboration for DDoS Attack Mitigation
Meeting Towards Collaboration for DDoS Attack MitigationUniversity of Twente
 
DDoS attacks and Booters -- *my thesis summary
DDoS attacks and Booters -- *my thesis summaryDDoS attacks and Booters -- *my thesis summary
DDoS attacks and Booters -- *my thesis summaryUniversity of Twente
 
Booter Blacklist: Unveiling DDoS-for-hire Websites
Booter Blacklist: Unveiling DDoS-for-hire WebsitesBooter Blacklist: Unveiling DDoS-for-hire Websites
Booter Blacklist: Unveiling DDoS-for-hire WebsitesUniversity of Twente
 
Civil Disobedience, DDoS attacks, Booters, and Beyond!
Civil Disobedience, DDoS attacks, Booters, and Beyond! Civil Disobedience, DDoS attacks, Booters, and Beyond!
Civil Disobedience, DDoS attacks, Booters, and Beyond! University of Twente
 
20160816 amlight popbahia_rnp_ansp
20160816 amlight popbahia_rnp_ansp20160816 amlight popbahia_rnp_ansp
20160816 amlight popbahia_rnp_anspUniversity of Twente
 

More from University of Twente (10)

DDoS attacks, Booters, and DDoSDB
DDoS attacks, Booters, and DDoSDBDDoS attacks, Booters, and DDoSDB
DDoS attacks, Booters, and DDoSDB
 
20170406 delft
20170406 delft20170406 delft
20170406 delft
 
Meeting Towards Collaboration for DDoS Attack Mitigation
Meeting Towards Collaboration for DDoS Attack MitigationMeeting Towards Collaboration for DDoS Attack Mitigation
Meeting Towards Collaboration for DDoS Attack Mitigation
 
DDoS attacks and Booters -- *my thesis summary
DDoS attacks and Booters -- *my thesis summaryDDoS attacks and Booters -- *my thesis summary
DDoS attacks and Booters -- *my thesis summary
 
Booter Blacklist: Unveiling DDoS-for-hire Websites
Booter Blacklist: Unveiling DDoS-for-hire WebsitesBooter Blacklist: Unveiling DDoS-for-hire Websites
Booter Blacklist: Unveiling DDoS-for-hire Websites
 
Inter-actief presentation
Inter-actief presentationInter-actief presentation
Inter-actief presentation
 
Civil Disobedience, DDoS attacks, Booters, and Beyond!
Civil Disobedience, DDoS attacks, Booters, and Beyond! Civil Disobedience, DDoS attacks, Booters, and Beyond!
Civil Disobedience, DDoS attacks, Booters, and Beyond!
 
20160816 amlight popbahia_rnp_ansp
20160816 amlight popbahia_rnp_ansp20160816 amlight popbahia_rnp_ansp
20160816 amlight popbahia_rnp_ansp
 
20160613 TNC TERENA
20160613 TNC TERENA20160613 TNC TERENA
20160613 TNC TERENA
 
20160416_de-cix
20160416_de-cix20160416_de-cix
20160416_de-cix
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 

20150909_cybercrime_cybersecurity_minor