Ataques dirigidos contra activistas

Ataques dirigidos
a activistas
David Barroso
Telefonica Digital
Uyghur
Uyghur
Uyghurhttp://surveillance.rsf.org/es/
https://tails.boum.org
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Uyghur
Ataques dirigidos contra activistas
Source: CitizenLab.org
Source: CitizenLab.org
ddddddasdfsdf
 FinFisher – Gamma Group
 Instala un driver
 Modifica MBR
 Se inyecta en procesos legítimos
(winlogon.exe, svchost.exe)
 Packer & anti-debugging
 AES-256-CBC
 C2: 77.69.140.194 (Bahrain) Puertos: 22, 53,
80, 443, 4111
ddddddasdfsdf
 FinFisher – Gamma Group
Bypassing of 40 regularly tested Antivirus Systems
Covert Communication with Headquarters
Full Skype Monitoring (Calls, Chats, File Transfers, Video,
Contact List)
Recording of common communication like Email, Chats
and Voice-over-IP
Live Surveillance through Webcam and Microphone
Country Tracing of Target
Silent Extracting of Files from Hard-Disk
Process-based Key-logger for faster analysis
Live Remote Forensics on Target System
Advanced Filters to record only important information
Supports most common Operating Systems (Windows,
Mac OSX and Linux)
Source: Rapid7
Source: CitizenLab.org
ddddddasdfsdf
 FinFisher – Gamma Group
 iOS version: install_manager.app
 Instalación por ‘provisioning profile’ (necesario UDID)
 Certificado: Martin Muench (Managing Director)
 /System/Library/LaunchDaemons/com.apple.logind.plis
t
 ‘Dropea’ SyncData.app
 Roba contactos, SMS, histórico de llamadas,
geolocalización, etc.
 Base64
 Versiones para Android, Symbian, BlackBerry
Source: CitizenLab.org
Uyghur
ddddddasdfsdf
 Mamfakinch.com
Svp ne mentionnez pas mon nom ni rien du tout je ne
veux pas d embrouilles…
http://freeme.eu5.org/scandale%20(2).doc
Mamfakinch.com
 Hacking Team – RCS
 OSX.Crisis / W32.Crisis
 Fichero adobe.jar -> versión para mac y win32
 Win32: CurrentVersion/Run. Infección de procesos
 Infecta imágenes VMware
Source: Symantec
Source: Symantec
Uyghur
ddddddasdfsdf
Concerns over Uyghur People.doc
Hosh Hewer.doc
Jenwediki yighingha iltimas qilish Jediwili.doc
list.doc
Press Release on Commemorat the Day of Mourning.doc
The Universal Declaration of Human Rights and the
Unrecognized Population Groups.doc
Uyghur Political Prisoner.doc
2013-02-04 - Deported Uyghurs.doc
Jenwediki yighingha iltimas qilish Jediwili(Behtiyar
Omer).doc
Kadeer Logistics detail.doc
Source: Kaspersky
ddddddasdfsdf
 Vulnerabilidad Word para Mac CVE-2012-
0158
 Abre documento real y ejecuta binario
 Keylogger, información de la máquina, control
remoto
 LaunchDaemon ‘systm’
 Tiny Shell
 AES (12345678) y SHA1
 ‘me’ como contacto
 C2: update.googmail.org (207.204.245.192)
ddddddasdfsdf
1154/0x2610: fstat(0x26, 0xBFFF4CD0, 0x200) = 0 0
1154/0x2610: lseek(0x26, 0x6600, 0x0) = 26112 0
1154/0x2610: open("/tmp/l.sh0", 0x602, 0x1FF) = 40
0
1154/0x2610: open("/tmp/l0", 0x602, 0x1FF) = 41 0
1154/0x2610: open("/tmp/l.doc0", 0x602, 0x1FF) = 42
0
1154/0x2610: read(0x26, "#!/bin/bashnsleep 1n/usr/bin/open
/tmp/l.docncp /tmp/l /tmp/mn/tmp/m0", 0x44) = 68 0
1154/0x2610: write(0x28, "#!/bin/bashnsleep 1n/usr/bin/open
/tmp/l.docncp /tmp/l /tmp/mn/tmp/m0", 0x44) = 68 0
Source: AlienVault
Ataques dirigidos contra activistas
Targeted Attacks
LURK/Gh0stRAT
Source: Citizelab.org
Targeted Attacks
Dalai Lama
Source: Kaspersky
Source: Kaspersky
ddddddasdfsdf
 Vulnerabilidad Word para Mac CVE-2012-
0158
 Abre documento real y ejecuta binario
 Keylogger, información de la máquina, control
remoto
 Binario firmado digitalmente
 C2: 61.178.77.76 TCP/1080
Source: Kaspersky
Source: Kaspersky
Source: Kaspersky
Targeted Attacks
Source: Symantec
Source: Symantec
Source: CitizenLab.org
ddddddasdfsdf
 Vulnerabilidad MSWORD CVE-2012-0158
 Abre documento real y ejecuta binario
 Keylogger, información de la máquina, control
remoto
 Binario firmado digitalmente
 C2: 114.142.147.51
ddddddasdfsdf
Metadata Original Dropped
MD5 8882c40ef1786efb
98ea251e247bfbee
40f41c077e03d72a
39eb1bd7bf6e3341
Last saved by HSwallow lebrale
Creation date Tue., Jun. 12
09:11:00 2012
Wed., Jun. 13
11:39:00 2012
Last save date Tue., Jun. 12
09:11:00 2012
Wed., Jun. 13
11:39:00 2012
Targeted Attacks
Source: CitizenLab.org
Source: CitizenLab.org
Source: CitizenLab.org
ddddddasdfsdf
 APT1 / GOGGLES vs GLASSES
 Aplicación simula ser carpeta
 Instala un PDF no malicioso (job posting en
Nepal), un binario spkptdhv.exe en %temp%
que se instala en el registro
 Comandos: sleep / download & run
GET /ewpindex.htm HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; Windows
NT 5.1; MSIE 7.0; Trident/4.0; Clj26Dbj.XYZ)
Host: ewplus.com
Cache-Control: no-cache
Android
Source: CitizenLab.org
ddddddasdfsdf
 Spoof en el From
 Tibetanos generalmente ‘rootean’ los Android
para instalar fuentes
 También instalan APK debido a restricciones
en Google Play
 Apps modificadas
 Intercepta SMS para dar posición
 Roba histórico de llamadas, SMS y contactos
 C2 android.uyghur.dnsd.me
Source: CitizenLab.org
Source: CitizenLab.org
Android
Source: Kaspersky
Source: Kaspersky
Source: Kaspersky
ddddddasdfsdf
 Robo de contactos, SMS, historial de
llamadas, datos del teléfono
 C2: Base64 a 64.78.161.133
Source: Kaspersky
Todo vale
Source: https://malwarelab.zendesk.com
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
http://unremote.org
ddddddasdfsdf
 Capture webcam activity
 Disable the notification setting for certain
antivirus programs
 Download and execute arbitrary programs
and commands
 Modify the hosts file
 Record key strokes
 Retrieve system information about the
computer
 Start or end processes
 Steal passwords
 Update itself
ddddddasdfsdf
 %Temp%dclogs[CURRENT DAY]-[RANDOM
NUMBER].dc
 %UserProfile%Start
MenuProgramsStartup(Empty).lnk
ddddddasdfsdf
 Autor: DarkCoderSc
 Fecha: 2008
 Versión actual: 5
 Lamenta lo ocurrido, y ofrece un
desinstalador
Ataques dirigidos contra activistas
Ingenieria Social
Source: Trendmicro
Source: EFF
Source: EFF
Source: EFF
Source: EFF
Malware
Source: EFF
Source: EFF
ddddddasdfsdf
 DarkComet RAT
 C:Documents and
SettingsAdministratorStart
MenuProgramsStartup(Empty).lnk
 C:DOCUME~1ADMINI~1LOCALS~1Temp
.pdf
 C:DOCUME~1ADMINI~1LOCALS~1Temp
Explorer.exe
 C:DOCUME~1ADMINI~1LOCALS~1Temp
msdlg.ocx
 C:DOCUME~1ADMINI~1LOCALS~1Temp
dclogs
Source: EFF
ddddddasdfsdf
 [] Aleppo Team
 [] Aleppo Team
rar
 [29/05/2012 18:03:44] Aleppo Team | | ...: Last
modified plan Aleppo time for Jihad
 [29/05/2012 18:03:46] Aleppo Team | | ...:
Send the file "plan eventually 2.rar"
Source: EFF
Source: EFF
Source: EFF
ddddddasdfsdf
 C:Documents and
SettingsAdministratorStartMenuProgramsS
tartup(empty).lnk
 C:DOCUME~1ADMINI~1LOCALS~1Temp
explorer.exe
 C:DOCUME~1ADMINI~1LOCALS~1Temp
Aleppo plan.pdf
 C:DOCUME~1ADMINI~1LOCALS~1Temp
Firefox.dll
Skype encryption
Source: EFF
Source: EFF
Source: EFF
ddddddasdfsdf
 DarkComet RAT
 http://skype-encryption.sytes.net/
 http://216.6.0.28/SkypeEncryption/Dow
nload/skype.exe
Antihacker
73%
Source: EFF
Source: EFF
Source: EFF
Source: EFF
Source: EFF
Source: EFF
ddddddasdfsdf
 DarkComet RAT
 Se conecta a 216.6.0.28/google.exe
 Keylogger:
C:DOCUME~1ADMINI~1LOCALS~1
Tempdclogs.sys
 C:Documents and
SettingsAdministratorStart
MenuProgramsStartup..lnk
BlackShades
73%
Source: EFF
http://bshades.eu/bsscmds.php
ddddddasdfsdf
With Blackshades Remote Controller you can:
- Control several computers at once, performing tasks
ranging from viewing their screens to
uploading/downloading files from them
- Perform maintenance on a Network
- Help a client out by using the screen capture feature,
even if they are on the other side of the world
- Monitor a specific PC, recording the keystrokes and
remotely managing the files
- Access your computer that you have at home if you are
on holiday
- Monitor the computers of students and their activity while
teaching a computing lesson
- Chat with clients that you are connected to
ddddddasdfsdf
 Cuentas comprometidas Skype
 Fichero .PIF
 ‘Windows Messanger’ – Alta en
firewall, Startup
 C2: alosh66.myftp.org (31.9.170.140)
4444/TCP
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
ddddddasdfsdf
 OSX.Kitm (Kumar in the mac)
 Rajinder Kumar
 OSX/Filesteal – OSX/HackBack
Source: F-Secure
Source: F-Secure
Ataques dirigidos contra activistas
Source: F-Secure
Source: F-Secure
Source: F-Secure
Gracias
David Barroso
@lostinsecurity
1 of 114

Recommended

Windows persistence presentation by
Windows persistence presentationWindows persistence presentation
Windows persistence presentationOlehLevytskyi1
60 views29 slides
Indicators of compromise: From malware analysis to eradication by
Indicators of compromise: From malware analysis to eradicationIndicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradicationMichael Boman
1.4K views29 slides
Opendaylight app development by
Opendaylight app developmentOpendaylight app development
Opendaylight app developmentvjanandr
1.2K views17 slides
Jackpot! Attacking Arcade Machines by
Jackpot! Attacking Arcade MachinesJackpot! Attacking Arcade Machines
Jackpot! Attacking Arcade MachinesPatrick Sayler
27 views86 slides
Linux 系統管理與安全:進階系統管理系統防駭與資訊安全 by
Linux 系統管理與安全:進階系統管理系統防駭與資訊安全Linux 系統管理與安全:進階系統管理系統防駭與資訊安全
Linux 系統管理與安全:進階系統管理系統防駭與資訊安全維泰 蔡
967 views45 slides
Linux 系統管理與安全:基本 Linux 系統知識 by
Linux 系統管理與安全:基本 Linux 系統知識Linux 系統管理與安全:基本 Linux 系統知識
Linux 系統管理與安全:基本 Linux 系統知識維泰 蔡
1.7K views74 slides

More Related Content

What's hot

SANS Forensics 2009 - Memory Forensics and Registry Analysis by
SANS Forensics 2009 - Memory Forensics and Registry AnalysisSANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry Analysismooyix
6K views33 slides
Windows forensic artifacts by
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifactsn|u - The Open Security Community
7.2K views13 slides
Introduction to malwares by
Introduction to malwaresIntroduction to malwares
Introduction to malwaresAbdessabour Arous
819 views76 slides
WannaCry emulation report by
WannaCry emulation reportWannaCry emulation report
WannaCry emulation reportDameon Welch-Abernathy
252 views17 slides
Install log by
Install logInstall log
Install logwindowsprogramfiles
127 views2 slides
Using the Power to Prove by
Using the Power to ProveUsing the Power to Prove
Using the Power to ProveKazuho Oku
2.8K views19 slides

What's hot(20)

SANS Forensics 2009 - Memory Forensics and Registry Analysis by mooyix
SANS Forensics 2009 - Memory Forensics and Registry AnalysisSANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry Analysis
mooyix6K views
Using the Power to Prove by Kazuho Oku
Using the Power to ProveUsing the Power to Prove
Using the Power to Prove
Kazuho Oku2.8K views
End of Studies project: Malware Repsonse Center by Abdessabour Arous
End of Studies project: Malware Repsonse CenterEnd of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse Center
Abdessabour Arous1.2K views
Unix Programming with Perl by Kazuho Oku
Unix Programming with PerlUnix Programming with Perl
Unix Programming with Perl
Kazuho Oku32.3K views
Simplest-Ownage-Human-Observed… - Routers by Logicaltrust pl
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - Routers
Logicaltrust pl2.5K views
Tracing MariaDB server with bpftrace - MariaDB Server Fest 2021 by Valeriy Kravchuk
Tracing MariaDB server with bpftrace - MariaDB Server Fest 2021Tracing MariaDB server with bpftrace - MariaDB Server Fest 2021
Tracing MariaDB server with bpftrace - MariaDB Server Fest 2021
Valeriy Kravchuk363 views
Windows 7 forensics -overview-r3 by CTIN
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN5.1K views
SANS @Night There's Gold in Them Thar Package Management Databases by Phil Hagen
SANS @Night There's Gold in Them Thar Package Management DatabasesSANS @Night There's Gold in Them Thar Package Management Databases
SANS @Night There's Gold in Them Thar Package Management Databases
Phil Hagen2.4K views
Character_Device_drvier_pc by Rashila Rr
Character_Device_drvier_pcCharacter_Device_drvier_pc
Character_Device_drvier_pc
Rashila Rr127 views
What is suid, sgid and sticky bit by Meenu Chopra
What is suid, sgid and sticky bit  What is suid, sgid and sticky bit
What is suid, sgid and sticky bit
Meenu Chopra63 views

Similar to Ataques dirigidos contra activistas

MacOS forensics and anti-forensics (DC Lviv 2019) presentation by
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationOlehLevytskyi1
308 views59 slides
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ... by
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Andrew Case
1.5K views43 slides
Zhp diag by
Zhp diagZhp diag
Zhp diagjulian audouard
363 views35 slides
Computer technicians-quick-reference-guide by
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guideShathees Rao
2.5K views11 slides
Solaris_quickref.pdf by
Solaris_quickref.pdfSolaris_quickref.pdf
Solaris_quickref.pdfRobertoBravo58
59 views3 slides
Linux filesystemhierarchy by
Linux filesystemhierarchyLinux filesystemhierarchy
Linux filesystemhierarchyDr. C.V. Suresh Babu
791 views29 slides

Similar to Ataques dirigidos contra activistas(20)

MacOS forensics and anti-forensics (DC Lviv 2019) presentation by OlehLevytskyi1
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
OlehLevytskyi1308 views
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ... by Andrew Case
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Andrew Case1.5K views
Computer technicians-quick-reference-guide by Shathees Rao
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
Shathees Rao2.5K views
Writing Character driver (loadable module) in linux by RajKumar Rampelli
Writing Character driver (loadable module) in linuxWriting Character driver (loadable module) in linux
Writing Character driver (loadable module) in linux
Linux Common Command by Jeff Yang
Linux Common CommandLinux Common Command
Linux Common Command
Jeff Yang909 views
NUMOSS 4th Week - Commandline Tutorial by Gagah Arifianto
NUMOSS 4th Week - Commandline TutorialNUMOSS 4th Week - Commandline Tutorial
NUMOSS 4th Week - Commandline Tutorial
Gagah Arifianto225 views
Introduction to ESP32 Programming [Road to RIoT 2017] by Alwin Arrasyid
Introduction to ESP32 Programming [Road to RIoT 2017]Introduction to ESP32 Programming [Road to RIoT 2017]
Introduction to ESP32 Programming [Road to RIoT 2017]
Alwin Arrasyid4K views
Владимир Пузанов - JailBreak: Разработка без лимитов by Pavel Bashmakov
Владимир Пузанов - JailBreak: Разработка без лимитовВладимир Пузанов - JailBreak: Разработка без лимитов
Владимир Пузанов - JailBreak: Разработка без лимитов
Pavel Bashmakov1K views
Swug July 2010 - windows debugging by sainath by Dennis Chung
Swug July 2010 - windows debugging by sainathSwug July 2010 - windows debugging by sainath
Swug July 2010 - windows debugging by sainath
Dennis Chung438 views
Introduction to shell scripting by Corrado Santoro
Introduction to shell scriptingIntroduction to shell scripting
Introduction to shell scripting
Corrado Santoro5.2K views
The New Systems Performance by Brendan Gregg
The New Systems PerformanceThe New Systems Performance
The New Systems Performance
Brendan Gregg7.6K views
Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin... by Joachim Jacob
Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin...Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin...
Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin...
Joachim Jacob1.5K views
GDG DevFest Kyoto 2014 これからのGoの話をしよう by Satoshi Noda
GDG DevFest Kyoto 2014 これからのGoの話をしようGDG DevFest Kyoto 2014 これからのGoの話をしよう
GDG DevFest Kyoto 2014 これからのGoの話をしよう
Satoshi Noda1.6K views
Unmasking Careto through Memory Forensics (video in description) by Andrew Case
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
Andrew Case1.7K views

More from David Barroso

El replanteamiento de la ciberseguridad by
El replanteamiento de la ciberseguridadEl replanteamiento de la ciberseguridad
El replanteamiento de la ciberseguridadDavid Barroso
602 views23 slides
OPSEC - Amanece que no es poco by
OPSEC - Amanece que no es pocoOPSEC - Amanece que no es poco
OPSEC - Amanece que no es pocoDavid Barroso
2.3K views65 slides
Infección en BIOS, UEFI y derivados by
Infección en BIOS, UEFI y derivadosInfección en BIOS, UEFI y derivados
Infección en BIOS, UEFI y derivadosDavid Barroso
2.7K views47 slides
En la época post-Snowden, ¿es la seguridad importante? by
En la época post-Snowden, ¿es la seguridad importante?En la época post-Snowden, ¿es la seguridad importante?
En la época post-Snowden, ¿es la seguridad importante?David Barroso
627 views59 slides
Un gentil viaje al interior de las extorsiones mediante DDoS by
Un gentil viaje al interior de las extorsiones mediante DDoSUn gentil viaje al interior de las extorsiones mediante DDoS
Un gentil viaje al interior de las extorsiones mediante DDoSDavid Barroso
1.3K views63 slides
Common Browser Hijacking Methods by
Common Browser Hijacking MethodsCommon Browser Hijacking Methods
Common Browser Hijacking MethodsDavid Barroso
3.1K views43 slides

More from David Barroso(12)

El replanteamiento de la ciberseguridad by David Barroso
El replanteamiento de la ciberseguridadEl replanteamiento de la ciberseguridad
El replanteamiento de la ciberseguridad
David Barroso602 views
OPSEC - Amanece que no es poco by David Barroso
OPSEC - Amanece que no es pocoOPSEC - Amanece que no es poco
OPSEC - Amanece que no es poco
David Barroso2.3K views
Infección en BIOS, UEFI y derivados by David Barroso
Infección en BIOS, UEFI y derivadosInfección en BIOS, UEFI y derivados
Infección en BIOS, UEFI y derivados
David Barroso2.7K views
En la época post-Snowden, ¿es la seguridad importante? by David Barroso
En la época post-Snowden, ¿es la seguridad importante?En la época post-Snowden, ¿es la seguridad importante?
En la época post-Snowden, ¿es la seguridad importante?
David Barroso627 views
Un gentil viaje al interior de las extorsiones mediante DDoS by David Barroso
Un gentil viaje al interior de las extorsiones mediante DDoSUn gentil viaje al interior de las extorsiones mediante DDoS
Un gentil viaje al interior de las extorsiones mediante DDoS
David Barroso1.3K views
Common Browser Hijacking Methods by David Barroso
Common Browser Hijacking MethodsCommon Browser Hijacking Methods
Common Browser Hijacking Methods
David Barroso3.1K views
Yersinia - Demostraciones prácticas de nuevos ataques de nivel dos by David Barroso
Yersinia - Demostraciones prácticas de nuevos ataques de nivel dosYersinia - Demostraciones prácticas de nuevos ataques de nivel dos
Yersinia - Demostraciones prácticas de nuevos ataques de nivel dos
David Barroso7.8K views
Recursos de la economía sumergida by David Barroso
Recursos de la economía sumergidaRecursos de la economía sumergida
Recursos de la economía sumergida
David Barroso347 views
Extorsiones mediante DDoS by David Barroso
Extorsiones mediante DDoSExtorsiones mediante DDoS
Extorsiones mediante DDoS
David Barroso750 views
Respuesta ágil ante incidentes by David Barroso
Respuesta ágil ante incidentesRespuesta ágil ante incidentes
Respuesta ágil ante incidentes
David Barroso632 views
[FTP|SQL|Cache] Injections by David Barroso
[FTP|SQL|Cache] Injections[FTP|SQL|Cache] Injections
[FTP|SQL|Cache] Injections
David Barroso3.6K views
iPhone + Botnets = Fun by David Barroso
iPhone + Botnets = FuniPhone + Botnets = Fun
iPhone + Botnets = Fun
David Barroso1.9K views

Recently uploaded

Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...ShapeBlue
173 views15 slides
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
263 views23 slides
The Role of Patterns in the Era of Large Language Models by
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
85 views65 slides
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
166 views28 slides
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
126 views10 slides
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueShapeBlue
135 views13 slides

Recently uploaded(20)

Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue173 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue263 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li85 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue166 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson160 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty64 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue123 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue132 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue138 views
DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue180 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue161 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10123 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue203 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 views

Ataques dirigidos contra activistas