Filter Evasion: Houdini on the Wire

Rob Ragan
Rob RaganPrincipal Researcher at Bishop Fox
Filter Evasion Houdini on the Wire Rob Ragan ( [email_address] ) HP Application Security Center
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some Reasons to Elude a Filter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Filters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why is it important to understand evasion tactics? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HTTP Filters Are Everywhere Filter Example Intrusion Detection Systems (IDS) Snort Web Application Firewall (WAF) ModSecurity Server Add-on IIS UrlScan Framework ASP.NET Request Validation Browser IE8 XSS Filter Application custom sanitizer See your code
New Filters ,[object Object],[object Object],[object Object],[object Object]
Filter Responsibility in the OSI Model
Who is responsible for each layer? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Whisker's anti-IDS tactics · 1999 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Details @ http://www.wiretrip.net/rfp/txt/whiskerids.html
Playbook – Let the games begin! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Canocalization ,[object Object],[object Object],[object Object],[object Object]
Canocalization ,[object Object],[object Object],[object Object],[object Object],[object Object]
Poison NULL Byte ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bypass WAF ,[object Object],[object Object],[object Object],[object Object]
Full-Width/Half-Width Unicode ,[object Object],[object Object],[object Object],[object Object],[object Object]
Full-Width/Half-Width Unicode Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HTTP Method Tampering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HTTP Method Tampering ,[object Object],[object Object],[object Object],[object Object],[object Object]
ASP.NET Validate Request
ASP.NET Framework XSS Filter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encoding Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Evasions in RSnake’s XSS Cheat Sheet  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encoding ,[object Object],[object Object],[object Object],[object Object]
70 Unique Ways to Encode < ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Still Partying Like It’s 1999 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASPROX (SQL Injection) Worm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Regular Expressions Are Hard ,[object Object],[object Object]
Catastrophic   Backtracking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Backtracking Example ,[object Object],[object Object],[object Object],[object Object],[object Object]
PHPIDS Regex Smoketest
PHPIDS Regex Smoketest
White lists are good, but… ,[object Object],[object Object],[object Object],[object Object]
Regex Libs Can Have Vulnerabilities ,[object Object],[object Object],[object Object],[object Object]
Biggest Target: Application Layer  ,[object Object],[object Object],[object Object]
Session Splicing ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP Fragmentation vs Session Splicing  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
State of the Evasion ,[object Object],[object Object],[object Object]
Session Splicing 1999 vs 2009 ,[object Object],1999 2009
Bypass Snort ,[object Object],[object Object],[object Object],[object Object]
Time Splicer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Snort Preprocessors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Default Session Timeouts ,[object Object],[object Object],[object Object],Server Type Timeout Apache/PHP 10 minutes IIS 5.0/ASP  15 minutes IIS 6.0/ASP.NET  20 minutes IIS 7.0/ASP.NET 20 minutes
DEMO ,[object Object]
Questions?
Rob Ragan ( [email_address] ) ,[object Object],[object Object]
1 of 49

Recommended

Static Analysis: The Art of Fighting without Fighting by
Static Analysis: The Art of Fighting without FightingStatic Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without FightingRob Ragan
2K views24 slides
Intro to Web Application Security by
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application SecurityRob Ragan
7.5K views35 slides
Attack Chaining: Advanced Maneuvers for Hack Fu by
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuRob Ragan
13.8K views72 slides
Writing Secure Code – Threat Defense by
Writing Secure Code – Threat DefenseWriting Secure Code – Threat Defense
Writing Secure Code – Threat Defenseamiable_indian
1.4K views45 slides
Top 10 Web Security Vulnerabilities by
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesCarol McDonald
7.7K views74 slides
Attackers Vs Programmers by
Attackers Vs ProgrammersAttackers Vs Programmers
Attackers Vs Programmersrobin_bene
7.8K views17 slides

More Related Content

What's hot

Secure code by
Secure codeSecure code
Secure codeddeogun
1.2K views44 slides
Methods to Bypass a Web Application Firewall Eng by
Methods to Bypass a Web Application Firewall EngMethods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall EngDmitry Evteev
12.3K views44 slides
Common Web Application Attacks by
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks Ahmed Sherif
802 views72 slides
20160225 OWASP Atlanta Prevoty RASP by
20160225 OWASP Atlanta Prevoty RASP20160225 OWASP Atlanta Prevoty RASP
20160225 OWASP Atlanta Prevoty RASPchadtindel
404 views34 slides
Session3 data-validation-sql injection by
Session3 data-validation-sql injectionSession3 data-validation-sql injection
Session3 data-validation-sql injectionzakieh alizadeh
224 views44 slides
Session10-PHP Misconfiguration by
Session10-PHP MisconfigurationSession10-PHP Misconfiguration
Session10-PHP Misconfigurationzakieh alizadeh
725 views59 slides

What's hot(20)

Secure code by ddeogun
Secure codeSecure code
Secure code
ddeogun1.2K views
Methods to Bypass a Web Application Firewall Eng by Dmitry Evteev
Methods to Bypass a Web Application Firewall EngMethods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall Eng
Dmitry Evteev12.3K views
Common Web Application Attacks by Ahmed Sherif
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
Ahmed Sherif802 views
20160225 OWASP Atlanta Prevoty RASP by chadtindel
20160225 OWASP Atlanta Prevoty RASP20160225 OWASP Atlanta Prevoty RASP
20160225 OWASP Atlanta Prevoty RASP
chadtindel404 views
Session3 data-validation-sql injection by zakieh alizadeh
Session3 data-validation-sql injectionSession3 data-validation-sql injection
Session3 data-validation-sql injection
zakieh alizadeh224 views
Web Security - OWASP - SQL injection & Cross Site Scripting XSS by Ivan Ortega
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega1.9K views
Application Security Part 1 Threat Defense In Client Server Applications ... by Greg Sohl
Application Security   Part 1   Threat Defense In Client Server Applications ...Application Security   Part 1   Threat Defense In Client Server Applications ...
Application Security Part 1 Threat Defense In Client Server Applications ...
Greg Sohl5.1K views
Beyond OWASP Top 10 - Hack In Paris 2017 by Aaron Hnatiw
Beyond OWASP Top 10 - Hack In Paris 2017Beyond OWASP Top 10 - Hack In Paris 2017
Beyond OWASP Top 10 - Hack In Paris 2017
Aaron Hnatiw917 views
Encoded Attacks And Countermeasures by Marco Morana
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
Marco Morana8K views
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009 by ClubHack
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
ClubHack2.4K views
Application and Website Security -- Fundamental Edition by Daniel Owens
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
Daniel Owens1.5K views
Examining And Bypassing The IE8 XSS Filter by kuza55
Examining And Bypassing The IE8 XSS FilterExamining And Bypassing The IE8 XSS Filter
Examining And Bypassing The IE8 XSS Filter
kuza557.9K views
Beyond OWASP Top 10 - TASK October 2017 by Aaron Hnatiw
Beyond OWASP Top 10 - TASK October 2017Beyond OWASP Top 10 - TASK October 2017
Beyond OWASP Top 10 - TASK October 2017
Aaron Hnatiw881 views
Owasp top 10 web application security hazards part 2 by Abhinav Sejpal
Owasp top 10 web application security hazards part 2Owasp top 10 web application security hazards part 2
Owasp top 10 web application security hazards part 2
Abhinav Sejpal875 views
Owasp Top 10 - Owasp Pune Chapter - January 2008 by abhijitapatil
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
abhijitapatil9.6K views
Security In PHP Applications by Aditya Mooley
Security In PHP ApplicationsSecurity In PHP Applications
Security In PHP Applications
Aditya Mooley1.7K views
Hacking the Web by Mike Crabb
Hacking the WebHacking the Web
Hacking the Web
Mike Crabb39K views

Similar to Filter Evasion: Houdini on the Wire

Web Application Security by
Web Application SecurityWeb Application Security
Web Application SecurityStuart Colville
1.2K views48 slides
Fav by
FavFav
Favhelloppt
880 views108 slides
&lt;img src="xss.com"> by
&lt;img src="xss.com">&lt;img src="xss.com">
&lt;img src="xss.com">"&lt;u>aaa&lt;/u>
7.6K views108 slides
OWASP Top 10 : Let’s know & solve by
OWASP Top 10 : Let’s know & solveOWASP Top 10 : Let’s know & solve
OWASP Top 10 : Let’s know & solveHarit Kothari
694 views31 slides
Avoiding Cross Site Scripting - Not as easy as you might think by
Avoiding Cross Site Scripting - Not as easy as you might thinkAvoiding Cross Site Scripting - Not as easy as you might think
Avoiding Cross Site Scripting - Not as easy as you might thinkErlend Oftedal
10.2K views60 slides
Securing Java EE Web Apps by
Securing Java EE Web AppsSecuring Java EE Web Apps
Securing Java EE Web AppsFrank Kim
4.8K views40 slides

Similar to Filter Evasion: Houdini on the Wire(20)

OWASP Top 10 : Let’s know & solve by Harit Kothari
OWASP Top 10 : Let’s know & solveOWASP Top 10 : Let’s know & solve
OWASP Top 10 : Let’s know & solve
Harit Kothari694 views
Avoiding Cross Site Scripting - Not as easy as you might think by Erlend Oftedal
Avoiding Cross Site Scripting - Not as easy as you might thinkAvoiding Cross Site Scripting - Not as easy as you might think
Avoiding Cross Site Scripting - Not as easy as you might think
Erlend Oftedal10.2K views
Securing Java EE Web Apps by Frank Kim
Securing Java EE Web AppsSecuring Java EE Web Apps
Securing Java EE Web Apps
Frank Kim4.8K views
Joomla security nuggets by guestbd1cdca
Joomla security nuggetsJoomla security nuggets
Joomla security nuggets
guestbd1cdca3.6K views
Applications secure by default by Slawomir Jasek
Applications secure by defaultApplications secure by default
Applications secure by default
Slawomir Jasek515 views
Applications secure by default by SecuRing
Applications secure by defaultApplications secure by default
Applications secure by default
SecuRing1.9K views
주로사용되는 Xss필터와 이를 공격하는 방법 by guestad13b55
주로사용되는 Xss필터와 이를 공격하는 방법주로사용되는 Xss필터와 이를 공격하는 방법
주로사용되는 Xss필터와 이를 공격하는 방법
guestad13b555.9K views
Web Application Security and Release of "WhiteHat Arsenal" by Jeremiah Grossman
Web Application Security and Release of "WhiteHat Arsenal"Web Application Security and Release of "WhiteHat Arsenal"
Web Application Security and Release of "WhiteHat Arsenal"
Jeremiah Grossman668 views
Teflon - Anti Stick for the browser attack surface by Saumil Shah
Teflon - Anti Stick for the browser attack surfaceTeflon - Anti Stick for the browser attack surface
Teflon - Anti Stick for the browser attack surface
Saumil Shah2.2K views
Eight simple rules to writing secure PHP programs by Aleksandr Yampolskiy
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs

More from Rob Ragan

Nbt hacker fight by
Nbt hacker fightNbt hacker fight
Nbt hacker fightRob Ragan
114 views27 slides
Expose Yourself Without Insecurity: Cloud Breach Patterns by
Expose Yourself Without Insecurity: Cloud Breach PatternsExpose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach PatternsRob Ragan
180 views38 slides
DeadDropSF - Better Red Than Dead by
DeadDropSF - Better Red Than DeadDeadDropSF - Better Red Than Dead
DeadDropSF - Better Red Than DeadRob Ragan
278 views23 slides
Interop 2017 - Defeating Social Engineering, BEC, and Phishing by
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingRob Ragan
829 views91 slides
Social Engineering: the Bad, Better, and Best Incident Response Plans by
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
2.9K views73 slides
BSidesPGH - Never Surrender - Reducing Social Engineering Risk by
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
30.5K views45 slides

More from Rob Ragan(10)

Nbt hacker fight by Rob Ragan
Nbt hacker fightNbt hacker fight
Nbt hacker fight
Rob Ragan114 views
Expose Yourself Without Insecurity: Cloud Breach Patterns by Rob Ragan
Expose Yourself Without Insecurity: Cloud Breach PatternsExpose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach Patterns
Rob Ragan180 views
DeadDropSF - Better Red Than Dead by Rob Ragan
DeadDropSF - Better Red Than DeadDeadDropSF - Better Red Than Dead
DeadDropSF - Better Red Than Dead
Rob Ragan278 views
Interop 2017 - Defeating Social Engineering, BEC, and Phishing by Rob Ragan
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Rob Ragan829 views
Social Engineering: the Bad, Better, and Best Incident Response Plans by Rob Ragan
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
Rob Ragan2.9K views
BSidesPGH - Never Surrender - Reducing Social Engineering Risk by Rob Ragan
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
Rob Ragan30.5K views
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer by Rob Ragan
CloudBots - Harvesting Crypto Currency Like a Botnet FarmerCloudBots - Harvesting Crypto Currency Like a Botnet Farmer
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
Rob Ragan5.2K views
Tenacious Diggity - Skinny Dippin in a Sea of Bing by Rob Ragan
Tenacious Diggity - Skinny Dippin in a Sea of BingTenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of Bing
Rob Ragan5.3K views
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki... by Rob Ragan
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Rob Ragan13.7K views
Lord of the Bing - Black Hat USA 2010 by Rob Ragan
Lord of the Bing - Black Hat USA 2010Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010
Rob Ragan11.5K views

Recently uploaded

From chaos to control: Managing migrations and Microsoft 365 with ShareGate! by
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!sammart93
9 views39 slides
Black and White Modern Science Presentation.pptx by
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptxmaryamkhalid2916
16 views21 slides
20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
33 views73 slides
Transcript: The Details of Description Techniques tips and tangents on altern... by
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...BookNet Canada
135 views15 slides
AMAZON PRODUCT RESEARCH.pdf by
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdfJerikkLaureta
19 views13 slides
Kyo - Functional Scala 2023.pdf by
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
298 views92 slides

Recently uploaded(20)

From chaos to control: Managing migrations and Microsoft 365 with ShareGate! by sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 views
Black and White Modern Science Presentation.pptx by maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291616 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada135 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta19 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10237 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
DALI Basics Course 2023 by Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg16 views
Web Dev - 1 PPT.pdf by gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet60 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker33 views

Filter Evasion: Houdini on the Wire