SlideShare a Scribd company logo
1 of 76
Download to read offline
NEVER	TRUST	YOUR	INPUTS:	
CAUSING	'CATASTROPHIC	PHYSICAL	CONSEQUENCES'	
FROM	THE	SENSOR	(OR	HOW	TO	FOOL	ADC)
;	CAT	/DEV/USER
2
Alexander	@dark_k3y	Bolshev,	Ph.D.
Security	Consultant	@	IOActive
Assistant	Professor	@	SPbETU “LETI”
Co-researcher:
Marina @marmusha	Krotofil
Security	Researcher	@HoneywellSec
3
AGENDA
q Problem	statement
q Analog-to-Digital	Converters	(ADC)
q “Racing”	with	ADC	clock
q Invalid	amplitude	range	of	signal
q Attack	vectors	in	ICS
q Mitigations
Workstation
Workstation
Firewall
ModemOperator	Console
Firewall
SQL	Server
PLC
RTU
Maintenance
File	Server
Webserver
Corporate	 LAN
SCADA	network
Webservices
Active Directory
Sensor
Ventil
Active Directory
Engineering	
Workstation
Process LAN
4
Physical
application
INDUSTRIAL	CONTROL	SYSTEMS
5
PROCESS	CONTROL	IN	A	NUTSHELL
Actuators
Control	
system
Physicalprocess Sensors
Measure	
process	state
Computes	control	
commands	for	
actuators
Adjust	themselves	
to	influence	
process	behavior
6
IMPACT	OF	IMPROPER	SIGNAL	PROCESSING
http://www.controlglobal.com/blogs/unfettered/marina-krotofils-presentation-on-
how-to-hack-a-chemical-plant-and-its-implication-to-actual-issues-at-a-nuclear-plant/
q Two	identically	built	nuclear	plants.		One	had	flow	induced	vibration	
issue.	And	another	did	not.
q The	vibrations	indication	showed	itself	as	hf noise
- Field	engineer	has	filtered	the	signal	to	get	rid	of	annoying	noise
- Loss	of	view	into	vibration	issue
Equipment	damage	at	nuclear	plant
Workstation
Workstation
Firewall
ModemOperator	Console
Firewall
SQL	Server
PLC
RTU
Maintenance
File	Server
Webserver
Corporate	 LAN
SCADA	network
Webservices
Active Directory
Sensor
Ventil
Active Directory
Engineering	
Workstation
Process LAN
7
Catastrophic
consequences
REASON	TO	SECURE	CONTROL	SYSTEMS
8
PROCESS	MONITORING
CONTROL	SYSTEM PROCESSOPERATOR OPERATOR	CONSOLE
(HMI)
9
CONSIDER	A	FIELD	ARCHITECTURE
Analog control
loop
Control PLC
Actuator
Safety PLC/Logger/DAQ/SIS
HMI
0V (actuator is OFF)
MV – Manipulated Variable
q What	if	MV value	on	actuator	will	be	different	
from	MV value	on	logger?
1.5V (actuator is ON)
10
BUT	IT’S	ANALOG	CONTROL	LINE!
Are	you	sure?
q It’s	impossible	to	have	two	different	MVs on	the	same	line	at	
the	same	time!
DEMO	SETUP	
11
“HMI Panel”
“Control PLC”
(arduino)
“Actuator”
(motor)
“Safety PLC”
(S7 1200)
12
DEMO	1
DEMO	VIDEO
-- Two	devices,	two	different	MVs	--
13
INTRO	TO	ANALOG-TO-DIGITAL
CONVERTERS (ADC)
15
WHAT	IS	ADC?
q Converts	a	continuousanalog	signal	(voltage	or	amperage)	
to	a	digital	number	that	represents		signal's	amplitude
t
x(t)
16
ADC	IN	A	NUTSHELL
Quantizing
&
Encoding	
…
• Frequency
• Phase
• Amplitude
Sampling & Holding
(S/H) circuit
Resolution
MSB
ADC
Clock
uI(t)
VREF
uI’(t)
fs
Dn-1
D1
D0
Conversion time
Input signal
17
EXPLOITABLE	ADC	DESIGN	CONSTRAINS
q Sampling	frequency	should	follow	Nyquist	rule	( >	2B)
-Otherwise	the	signal	will	appear	of	false (alias) frequency
fs
18
EXPLOITABLE	ADC	DESIGN	CONSTRAINS
q Amplitude	of	the	input	signal	should	not	exceed	ADC’s	
dynamic	range
-It	is	determined	by	the	reference	voltage
Time
5	
10
V
0
19
TYPES	OF	ADC
There	are	many	ADC	types	(>10).	The	most	common	are:
q Successive-approximation	ADC	(SAR)
q Sigma-delta	ADC
q Pipeline
http://electronicdesign.com/analog/real-world-versus-your-adc
http://www.planetanalog.com/author.asp?section_id=3193&doc_id=561627
SUCCESSIVE	APPROXIMATION	
REGISTER	(SAR)	ADC
21
BLOCK	DIAGRAM
https://en.wikipedia.org/wiki/Successive_approximation_ADC
- DAC =	Digital-to-Analog	converter
- EOC =	End	of	Conversion
- SAR =	Successive	Approximation	
Register
- S/H =	Sample	and	Hold	circuit
- VIN =	Input	Voltage
- VREF =	Reference	Voltage
SAR
DAC
S/H +
-
Clock EOC
Comparator
VIN
VREF
DN-1 DN-2 D1 D0
22
SAR:	WEIGHING	PROBLEM
q SAR	algorithm	is	based	on	one	of	the	solutions	to	
weighing	problem	by	Niccolò Fontana	Tartaglia,	
Italian	mathematician	and	engineer	in	1556	
https://en.wikipedia.org/wiki/Niccol%C3%B2_Fontana_Tartaglia
http://www.analog.com/media/en/training-seminars/tutorials/MT-021.pdf
q The	objective	is	to	determine	the	least	
number	of	weights	which	would	serve	
to	weigh	an	integral	number	of	pounds	
from	1	lb to	40	lb using	a	balance	scale
23
ADC:	WEIGHING	PROCESS
VIN
VREF
¾	VREF
½	VREF
¼	VREF
VDAC
BIT	2	=	1 BIT	0	=	1BIT	1	=	0BIT	3	=	0
Time
(MSB) (LSB)
„Racing“	with ADC	CLOCK
-- SAR	ADC	--
LETS	SETUP	EXPERIMENT
Experimental	setup:
- Arduino	 Leonardo	
(Atmega32U4	with	build-in	
ADC,	125kHz	int clock)
- Si5351	generator
Algorithm:
1. Generate	square	signal	with	
specific	frequency	and	phase,
2. Read	120	ADC	values	in	row	
and	average	them,
3. Output	to	serial	port	(PC),
4. Increase	phase	and	frequency,
5. GOTO	1.
26
RESULT
What is this?!
27
RACING	WITH	ADC	CLOCK
28
LETS	REPEAT	OUR	EXPERIMENT
Frequency	=	around	8.9kHz
for(;;){
asm("cbi 0x0e, 6");
val = __fastAnalogRead(A0); //inline function
asm("sbi 0x0e, 6");
sum += val;
step++;
if(step > 120){
if(phase >= 170){
phase = 0;
freq += 100;
}else
phase += 10;
si5351.set_freq(freq, 0ULL, SI5351_CLK0);
si5351.set_phase(SI5351_CLK0, phase);
Serial.print(sum * 1.0/step); 29
LETS	REPEAT	OUR	EXPERIMENT
Let’s	introduce	“counter”	to	our	code	for	averaging	120	ADC	conversions:
Fast analog read
Average, frequency changing
and out to serial port
goes here
We’re putting here an outgoing
Zero-peak signal to see when
ADC do actual work
30
TIMING	DIAGRAM	EXPLAINS	EVERYTHING
31
FROM	ATMEGA	34U4	DATASHEET
Chapter	24	on	ADC	,	page	302
125kHz	/	14	~	8928Hz	(112μs)
We’ve	just	breached	through	sampling	rate	
precision	of	the	ADC!
32
NOT	ONLY	BUILT-IN	ADCS
Test	results	for	MCP3201	MCU
fCLK =	125kHZ
fCLK =	8MHZ
14.3kHz
292.5kHz
33
DEMO	2
LIVE	DEMO	
-- Proof	--
34
RACING	WITH	ADC	CLOCK
-- Delta-Sigma	ADC	--
35
DELTA	SIGMA	ADC
q Delta-sigma	(ΔΣ;	or	sigma-delta,	ΣΔ)	modulation	is	a	method	for	
encoding	analog	signals	into	digital	signals	as	found	in	an	ADC.
q Typically,	delta-sigma	ADCs	clocks	from	high-frequency signal,	
but	the	resulting	sample	rate	is	much	slower than	for	other	
types	of	ADC
q Example:	AD7706	ADC,	clock	frequency	– 2MHz,	output	sample	
rate	– 25-500	samples per	second.
q This	allows	to	produced	results	with	bigger	resolution	and	much	
reliability.
https://en.wikipedia.org/wiki/Delta-sigma_modulation
36
MODUS	OPERANDI
http://www.analog.com/library/analogDialogue/archives/33-08/adc/index.html
https://en.wikipedia.org/wiki/Delta-sigma_modulation
https://www.maximintegrated.com/en/app-notes/index.mvp/id/1870
37
DEMO	3
Still	exploitable?
LIVE	DEMO	
-- delta-sigma	--
38
39
ATTACK	EFFORTS:	SIGMA-DELTA	VS.	SAR
q SAR	ADCs	are	much	easier	to	exploit	(due	its	simple	nature),	
however	increasing	SAR	clock	frequency	could	produce	more	
problems	for	attacker
q Delta-sigma	ADCs	allows	only	a	few	ways	to	craft	reliable	attack,	
however	the	result	could	overwhelm	your	needs.
40
-- ADC	access	timing	--
SOFTWARE-RELATED	PROBLEMS
41
DEMO	4
DEMO	VIDEO
-- One	signal,	two	ADCs	--
42
FROM	DEMO:	TWO	DEVICES	&	TWO	DIFF	OUTPUTS	
Wait,	but	why?	Timing	diagrams	can	explain	;-)
43
EVERYTHING	IS	MUCH	EASIER	IN	THE	ICS	WORLD	
q In	many	real-world ICS applications	ADC	doesn’t	sample	input	
signal	with	highest	possible	frequency
- Typical	sampling	rate	is	1-100	times	per	second
Maliciously	crafted	
voltage
44
HURDLES	OF	THE	ATTACKER	
q How	to	figure	out	the	required	phase	and	
frequency	to	craft	needed	malicious	signal?	
q Send	some	peak	signals	and	monitor	output	of	the	
ADC	(directly/indirectly)
q E.g.	by	hacking	into	switch	you	can	monitor/control	
both	data	flow	to	control	PLC	AND signals	from	
SIS/Safety	LC/logger/DAQ/etc
45
FIGURING	OUT	SIGNAL	PARAMETERS	
Control	PLC
Actuator
Safety	PLC/Logger/DAQ/SIS
HMI
Compromised	
industrial	switch
46
-- ADC	conversion	time	--
SOFTWARE-RELATED	PROBLEMS
47
ADC	IN	CRITICAL	APPLICATIONS	
Be	careful	when	using	ADC	in	critical	applications	
q Industrial	PLCs	also	have	analog	inputs	
and	built-in	ADCs
q Let’s	test	at	one	of	the	most popular PLCs
S7	1200	μ
48
Let’s	check	the	real	conversion	time	of	S7	1200	ADC
Arduino
Waveform	generator S7	1200
Analog	signal
S7	Protocol
S7	input	amplitudeFrequency
I2C
Reads	value	from	
PLC	every	N	time
EXPERIMENT	SETUP
49Frequency	is	fixed
N=8.3ms
N=9ms
N=7ms
N=4.5ms
N=2.5ms
50
51
Nothing,	really.	You	just	need	to	read	datasheet	
more	thoroughly
Text in small
letters
WHAT’S	WRONG?
52
INVALID	RANGE	OF	SIGNALS
53
q Consider	a	5-10V	signal	which	is	
consumed	by		ADC	with	ranges	0-15	V
q What	will	happen	if	you	send	signal	
lower	than	5V	or	higher	10V?
Time
5	
10
V
From the real life code:
uint8_t val = readADC(0); // reading	8-bit	ADC	value	with	ranges	0V	-15	V
val = val – 85; // Normalization	->	85	==	5	Volts	(255/3)
Any	signal	of	less	them	5	V	(val < 85)will	cause	integer	overflow in	val
BREAKING	SOFTWARE	DEFINED	RANGES	(I)
54
BREAKING	SOFTWARE	DEFINED	RANGES	(II)	
What	if	the	attacker	sends	signal	outside	of	the	ADS	hardware	defined	
range	(>Vref)?
q ADC	will	output	max	value		(all	bit	set	to	1)
q ADC	might	be	damaged	(did	not	test	out	of	cost	factors	J)
q Values	on	other		inputs could	be	distorted
55
DEMO	SETUP
USB	
UART
Negative	Power	source
Atmega328p
Optical	
Isolator
56
DEMO	5
DEMO	VIDEO
-- Negative	input	signal	--
(breaking	hardware	range)
57
ANOTHER	EXAMPLE
Breaking	HW	RANGES	for	NXP	LPC	11U24F	internal	ADC	(3.3VRef)
ADC/Ref Volts A-3 A-2
A-1 A-0 A+1 A+2 A+3
NXP	LPC	
11U24F	
(3.3VRef)
0.48 0.0 0.48 1.58 3.3
3.39 0.0 3.3 1.59 3.3
4.1 0.087 3.3 1.729 3.3
4.65 0.17 3.3 1.974 3.3
5.1 0.44 3.3 2.212 3.3
5.9 0.0 2.035 1.561 3.3
6.1-9.8 ~ ~ ~ ~
-0.48 0.0 0.0 1.58 3.3
-1.1 0.0 0.0 1.64 3.20
-1.5 0.025 0.0 1.71 3.07
-1.7 0.0 0.0 2.5 2.9
-2 ~ ~ ~ ~
58
ATTACK	VECTORS	IN	ICS
59
Line	coupling	circuit
(usually	OpAmp/Transformer)
Total	setup	cost
50$	(1kHz)	-- 400$	(50MHz)
DIRECT	ACCESS	ATTACK	TOOL	KIT
60
ATTACKING	FROM	ICS	DEVICE	
qCompromising	one	of	the	field	components	(PLC,	sensor,	actuator,	
DAQ,	logger,	etc.)
- Most	MCUs	inside	transmitters/actuators	are	capable	of	generating	
arbitrary	signals	up	to	500-1000Hz
- Some	devices	allow	to	generate	signals	of	44kHz	and	above
61
ATTACK	FROM	TRANSMITTER	
HART	transmitter	reference	design	;-)
DAC with s/r up to 100kHz
(smooth sine wave at ~ 5kHz)
http://www.tm-eetimes.com/en/accurate-industrial-temperature-measurements-with-loop-powered-
transmitter.html?cmp_id=7&news_id=222918850
62
MITIGATIONS
63
HARDWARE	MITIGATIONS
64
LPF	FILTERS	IN	REFERENCE	DESIGN	
q Low-pass	filter	rejects	signals	with	a	
frequency	higher	than	its	cutoff	
frequency
q Buffer	ADC	input	with	LPF
q Good	design	dictates	ADC	fs >=	LPF	fc
65
LPF	FILTERS	IN	REFERENCE	DESIGN	
“We	included	LPF	in	our	design"
ADC	with	fs >	470Hz
LPF	with	fc near	15	kHz
66
SOLUTION
67
FLIP	SIDE	OF	USING	LPF	
q When	adding	LPF	into	an	individual	device,	make	sure	that	all	
related	devices	have	the	same cut-off	frequencies
”Securing”	may	lead	to	more	vulnerabilities
q E.g.	if	PLC	input is	buffered	with	LPF	
𝒇 𝒄 = 𝟏𝒌𝑯𝒛 and	actuator equipped	
with	LPF	with	𝒇 𝒄 = 𝟓𝒌𝑯𝒛,	the	attack	
not	only	possible,	but	the	probability	
of	success	increases!
68
NOTE:	DIGITAL	LPF	WON’T	WORK!
Do	not	use	digital	LPF	after the	ADC!
q ADC	will	be	already	compromised	by	an	ill-
intended	signal	and	no	digital	filter	will	fix	
the	matters
69
USE	ADC	WITH	HIGHER	BANDWIDTH/LOWER	
CONVERSION	TIME
q Using	ADC	with	higher	sampling	frequency	can	mitigate	
“oversampling”	attack	as	the	attacker	will	have	to	generate	
signal	of	much	higher	frequency
q Generating	>1MHz	signal	and	injecting	it	into	analog	line	is	
much	harder	than	injecting	<	1MHz	signal
- H/f	signals	subjected	to	greater	attenuation	and	more	affected	
by	noise
70
SCALE	SIGNAL	AMPLITUDE	BEFORE	ADC	
q To	avoid	abuse	of	ADC	ranges,	normalize	signal	amplitude	
before	feeding	the	signal	to	ADC
- Simplest	option:	voltage	divider	+	OpAmp,	
- Signal	conditioning	circuits	or		even	
dynamic	range	compression	
Select	what	is	suitable	for	your	OT	process
71
SOFTWARE	MITIGATIONS
72
SAMPLING	FREQUENCY	RANDOMIZATION
http://www.sixsigma4service.com/evaluation-considerations-for-data-sampling.html
SAMPLING	FREQUENCY	RANDOMIZATION
q Certain randomness	in	sampling	frequency	will	make	attacker’s	
job	much	harder	
-Many	of	the	discussed	attacks	will	be	much	more	challenging	to	execute
q Small	variation	of	𝒇) won’t	degrade	conversion	process.	On	the	
contrary,	it	will	produce	a	signal	sample	of	better	quality.
𝒇) = 𝑓 + rand(△)
Time
V
0
73
APLY	SECURE	CODING	TECHNIQUES
q Scrutinize	your	ADCs/PLC	datasheets	to	figure	out	effective
ranges,	conversion	time,	frequency	and	other	critical	
parameters
q Even	if	it	is	sufficient	to	control	the	process	with	one	value	
per	second,	sample	the	signal	with	higher	frequency	and	
average	converted	values
q When	receiving	value	from	ADC,	treat	it	as	an	absolute	value	
(all	bits	received	from	ADC	are	significant)
74
DON’T	SLEEP!	(WHILE	ON	DUTY	J )	
Avoid	writing/using		the	following	code	(if	you	don’t	completely	
understand	your	process	and	aren’t	completely	sure	about	what	you	
are	doing)
Val = readADC();
Output(Val);
Sleep(Timeout);
75
OT	AND	IT	HAVE	COMMON	PROBLEMS
NEVER	TRUST	YOUR	INPUTS
@dark_k3y
@marmusha

More Related Content

What's hot

Klessydra t - designing vector coprocessors for multi-threaded edge-computing...
Klessydra t - designing vector coprocessors for multi-threaded edge-computing...Klessydra t - designing vector coprocessors for multi-threaded edge-computing...
Klessydra t - designing vector coprocessors for multi-threaded edge-computing...RISC-V International
 
Keysight Mini-ICT - Testing Days México
Keysight Mini-ICT - Testing Days MéxicoKeysight Mini-ICT - Testing Days México
Keysight Mini-ICT - Testing Days MéxicoInterlatin
 
Básicos de Functional Test Systems - Testing Days Tijuana
Básicos de Functional Test Systems - Testing Days TijuanaBásicos de Functional Test Systems - Testing Days Tijuana
Básicos de Functional Test Systems - Testing Days TijuanaInterlatin
 
Introduction to Vortex86DX2 Motion-Control Evaluation Board
Introduction to Vortex86DX2 Motion-Control Evaluation BoardIntroduction to Vortex86DX2 Motion-Control Evaluation Board
Introduction to Vortex86DX2 Motion-Control Evaluation Boardroboard
 
建構嵌入式Linux系統於SD Card
建構嵌入式Linux系統於SD Card建構嵌入式Linux系統於SD Card
建構嵌入式Linux系統於SD Card艾鍗科技
 
한컴MDS_Virtual Target Debugging with TRACE32
한컴MDS_Virtual Target Debugging with TRACE32한컴MDS_Virtual Target Debugging with TRACE32
한컴MDS_Virtual Target Debugging with TRACE32HANCOM MDS
 
OSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner FischerOSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner FischerNETWAYS
 
Debug dpdk process bottleneck & painpoints
Debug dpdk process bottleneck & painpointsDebug dpdk process bottleneck & painpoints
Debug dpdk process bottleneck & painpointsVipin Varghese
 
An Open Discussion of RISC-V BitManip, trends, and comparisons _ Claire
 An Open Discussion of RISC-V BitManip, trends, and comparisons _ Claire An Open Discussion of RISC-V BitManip, trends, and comparisons _ Claire
An Open Discussion of RISC-V BitManip, trends, and comparisons _ ClaireRISC-V International
 
Dpdk: rte_security: An update and introducing PDCP
Dpdk: rte_security: An update and introducing PDCPDpdk: rte_security: An update and introducing PDCP
Dpdk: rte_security: An update and introducing PDCPHemant Agrawal
 
wd1-01-jaseel-madhusudan-pres-user
wd1-01-jaseel-madhusudan-pres-userwd1-01-jaseel-madhusudan-pres-user
wd1-01-jaseel-madhusudan-pres-userjaseel_abdulla
 

What's hot (20)

Klessydra t - designing vector coprocessors for multi-threaded edge-computing...
Klessydra t - designing vector coprocessors for multi-threaded edge-computing...Klessydra t - designing vector coprocessors for multi-threaded edge-computing...
Klessydra t - designing vector coprocessors for multi-threaded edge-computing...
 
Keysight Mini-ICT - Testing Days México
Keysight Mini-ICT - Testing Days MéxicoKeysight Mini-ICT - Testing Days México
Keysight Mini-ICT - Testing Days México
 
Básicos de Functional Test Systems - Testing Days Tijuana
Básicos de Functional Test Systems - Testing Days TijuanaBásicos de Functional Test Systems - Testing Days Tijuana
Básicos de Functional Test Systems - Testing Days Tijuana
 
Introduction to Vortex86DX2 Motion-Control Evaluation Board
Introduction to Vortex86DX2 Motion-Control Evaluation BoardIntroduction to Vortex86DX2 Motion-Control Evaluation Board
Introduction to Vortex86DX2 Motion-Control Evaluation Board
 
建構嵌入式Linux系統於SD Card
建構嵌入式Linux系統於SD Card建構嵌入式Linux系統於SD Card
建構嵌入式Linux系統於SD Card
 
Onnc intro
Onnc introOnnc intro
Onnc intro
 
한컴MDS_Virtual Target Debugging with TRACE32
한컴MDS_Virtual Target Debugging with TRACE32한컴MDS_Virtual Target Debugging with TRACE32
한컴MDS_Virtual Target Debugging with TRACE32
 
OSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner FischerOSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner Fischer
 
Debug dpdk process bottleneck & painpoints
Debug dpdk process bottleneck & painpointsDebug dpdk process bottleneck & painpoints
Debug dpdk process bottleneck & painpoints
 
The IEEE 1149.1 Boundary-scan test standard
The IEEE 1149.1 Boundary-scan test standardThe IEEE 1149.1 Boundary-scan test standard
The IEEE 1149.1 Boundary-scan test standard
 
Prezentare tcs2011
Prezentare tcs2011Prezentare tcs2011
Prezentare tcs2011
 
Linux interrupts
Linux interruptsLinux interrupts
Linux interrupts
 
Dynamic user trace
Dynamic user traceDynamic user trace
Dynamic user trace
 
Dpdk applications
Dpdk applicationsDpdk applications
Dpdk applications
 
W10: Interrupts
W10: InterruptsW10: Interrupts
W10: Interrupts
 
Session1
Session1Session1
Session1
 
An Open Discussion of RISC-V BitManip, trends, and comparisons _ Claire
 An Open Discussion of RISC-V BitManip, trends, and comparisons _ Claire An Open Discussion of RISC-V BitManip, trends, and comparisons _ Claire
An Open Discussion of RISC-V BitManip, trends, and comparisons _ Claire
 
dft
dftdft
dft
 
Dpdk: rte_security: An update and introducing PDCP
Dpdk: rte_security: An update and introducing PDCPDpdk: rte_security: An update and introducing PDCP
Dpdk: rte_security: An update and introducing PDCP
 
wd1-01-jaseel-madhusudan-pres-user
wd1-01-jaseel-madhusudan-pres-userwd1-01-jaseel-madhusudan-pres-user
wd1-01-jaseel-madhusudan-pres-user
 

Viewers also liked

Георгий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangГеоргий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangDefconRussia
 
Cisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneCisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneDefconRussia
 
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...DefconRussia
 
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobindingDefconRussia
 
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...DefconRussia
 
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...DefconRussia
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/LinuxDefconRussia
 
Weakpass - defcon russia 23
Weakpass - defcon russia 23Weakpass - defcon russia 23
Weakpass - defcon russia 23DefconRussia
 
nosymbols - defcon russia 20
nosymbols - defcon russia 20nosymbols - defcon russia 20
nosymbols - defcon russia 20DefconRussia
 
Attacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринAttacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринDefconRussia
 
static - defcon russia 20
static  - defcon russia 20static  - defcon russia 20
static - defcon russia 20DefconRussia
 
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...DefconRussia
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20DefconRussia
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20DefconRussia
 
Nedospasov defcon russia 23
Nedospasov defcon russia 23Nedospasov defcon russia 23
Nedospasov defcon russia 23DefconRussia
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23DefconRussia
 
HTTP HOST header attacks
HTTP HOST header attacksHTTP HOST header attacks
HTTP HOST header attacksDefconRussia
 
Anton Dorfman - Reversing data formats what data can reveal
Anton Dorfman - Reversing data formats what data can revealAnton Dorfman - Reversing data formats what data can reveal
Anton Dorfman - Reversing data formats what data can revealDefconRussia
 
Alexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementAlexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementDefconRussia
 
Tyurin Alexey - NTLM. Part 1. Pass-the-Hash
Tyurin Alexey - NTLM. Part 1. Pass-the-HashTyurin Alexey - NTLM. Part 1. Pass-the-Hash
Tyurin Alexey - NTLM. Part 1. Pass-the-HashDefconRussia
 

Viewers also liked (20)

Георгий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangГеоргий Зайцев - Reversing golang
Георгий Зайцев - Reversing golang
 
Cisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneCisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-one
 
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
 
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
 
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
 
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
 
Weakpass - defcon russia 23
Weakpass - defcon russia 23Weakpass - defcon russia 23
Weakpass - defcon russia 23
 
nosymbols - defcon russia 20
nosymbols - defcon russia 20nosymbols - defcon russia 20
nosymbols - defcon russia 20
 
Attacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринAttacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей Тюрин
 
static - defcon russia 20
static  - defcon russia 20static  - defcon russia 20
static - defcon russia 20
 
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20
 
Nedospasov defcon russia 23
Nedospasov defcon russia 23Nedospasov defcon russia 23
Nedospasov defcon russia 23
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23
 
HTTP HOST header attacks
HTTP HOST header attacksHTTP HOST header attacks
HTTP HOST header attacks
 
Anton Dorfman - Reversing data formats what data can reveal
Anton Dorfman - Reversing data formats what data can revealAnton Dorfman - Reversing data formats what data can reveal
Anton Dorfman - Reversing data formats what data can reveal
 
Alexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implementAlexey Sintsov- SDLC - try me to implement
Alexey Sintsov- SDLC - try me to implement
 
Tyurin Alexey - NTLM. Part 1. Pass-the-Hash
Tyurin Alexey - NTLM. Part 1. Pass-the-HashTyurin Alexey - NTLM. Part 1. Pass-the-Hash
Tyurin Alexey - NTLM. Part 1. Pass-the-Hash
 

Similar to [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC

Never Trust Your Inputs or how to fool an ADC
Never Trust Your Inputs or how to fool an ADCNever Trust Your Inputs or how to fool an ADC
Never Trust Your Inputs or how to fool an ADCAlexander Bolshev
 
A PROJECT ON scada.pptx
A PROJECT ON scada.pptxA PROJECT ON scada.pptx
A PROJECT ON scada.pptxAshhadRaza1
 
Resume_Karthik_Koneru_Analog_and_Mixed Signal
Resume_Karthik_Koneru_Analog_and_Mixed SignalResume_Karthik_Koneru_Analog_and_Mixed Signal
Resume_Karthik_Koneru_Analog_and_Mixed SignalArizona State University
 
Resume_Karthik_Koneru_Analog_and_Mixed Signal
Resume_Karthik_Koneru_Analog_and_Mixed SignalResume_Karthik_Koneru_Analog_and_Mixed Signal
Resume_Karthik_Koneru_Analog_and_Mixed SignalArizona State University
 
Tools for Practical Attacks on Analog-to-Digital Conversion
Tools for Practical Attacks on Analog-to-Digital ConversionTools for Practical Attacks on Analog-to-Digital Conversion
Tools for Practical Attacks on Analog-to-Digital ConversionAlexander Bolshev
 
Aircraft master warning system with ftc prompting
Aircraft master warning system with ftc promptingAircraft master warning system with ftc prompting
Aircraft master warning system with ftc promptingSudhanshu Janwadkar
 
OPAL-RT Webinar - Challenges in Protection Relay Testing
OPAL-RT Webinar - Challenges in Protection Relay TestingOPAL-RT Webinar - Challenges in Protection Relay Testing
OPAL-RT Webinar - Challenges in Protection Relay TestingOPAL-RT TECHNOLOGIES
 
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...OPAL-RT TECHNOLOGIES
 
HYPERSIM Relay Protection Webinar
HYPERSIM Relay Protection WebinarHYPERSIM Relay Protection Webinar
HYPERSIM Relay Protection WebinarEtienne Leduc
 
Mixed signal verification challenges
Mixed signal verification challengesMixed signal verification challenges
Mixed signal verification challengesRégis SANTONJA
 
Ph.D. Defence on "High power medium voltage dc/dc converter technology for D...
 Ph.D. Defence on "High power medium voltage dc/dc converter technology for D... Ph.D. Defence on "High power medium voltage dc/dc converter technology for D...
Ph.D. Defence on "High power medium voltage dc/dc converter technology for D...CatalinGabrielDincan
 
Challenges of Parallel Simulation of Power Systems_english
Challenges of Parallel Simulation of Power Systems_englishChallenges of Parallel Simulation of Power Systems_english
Challenges of Parallel Simulation of Power Systems_englishOPAL-RT TECHNOLOGIES
 
Trends in Mixed Signal Validation
Trends in Mixed Signal ValidationTrends in Mixed Signal Validation
Trends in Mixed Signal ValidationDVClub
 

Similar to [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC (20)

Never Trust Your Inputs or how to fool an ADC
Never Trust Your Inputs or how to fool an ADCNever Trust Your Inputs or how to fool an ADC
Never Trust Your Inputs or how to fool an ADC
 
Never Trust Your Inputs
Never Trust Your InputsNever Trust Your Inputs
Never Trust Your Inputs
 
presentation_sas2016_V3
presentation_sas2016_V3presentation_sas2016_V3
presentation_sas2016_V3
 
A PROJECT ON scada.pptx
A PROJECT ON scada.pptxA PROJECT ON scada.pptx
A PROJECT ON scada.pptx
 
Resume_Karthik_Koneru_Analog_and_Mixed Signal
Resume_Karthik_Koneru_Analog_and_Mixed SignalResume_Karthik_Koneru_Analog_and_Mixed Signal
Resume_Karthik_Koneru_Analog_and_Mixed Signal
 
Resume_Karthik_Koneru_Analog_and_Mixed Signal
Resume_Karthik_Koneru_Analog_and_Mixed SignalResume_Karthik_Koneru_Analog_and_Mixed Signal
Resume_Karthik_Koneru_Analog_and_Mixed Signal
 
Tools for Practical Attacks on Analog-to-Digital Conversion
Tools for Practical Attacks on Analog-to-Digital ConversionTools for Practical Attacks on Analog-to-Digital Conversion
Tools for Practical Attacks on Analog-to-Digital Conversion
 
Overview of RTaW SysML-Companion
Overview of RTaW SysML-Companion Overview of RTaW SysML-Companion
Overview of RTaW SysML-Companion
 
Aircraft master warning system with ftc prompting
Aircraft master warning system with ftc promptingAircraft master warning system with ftc prompting
Aircraft master warning system with ftc prompting
 
OPAL-RT Webinar - Challenges in Protection Relay Testing
OPAL-RT Webinar - Challenges in Protection Relay TestingOPAL-RT Webinar - Challenges in Protection Relay Testing
OPAL-RT Webinar - Challenges in Protection Relay Testing
 
final report
final reportfinal report
final report
 
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
 
HYPERSIM Relay Protection Webinar
HYPERSIM Relay Protection WebinarHYPERSIM Relay Protection Webinar
HYPERSIM Relay Protection Webinar
 
Mixed signal verification challenges
Mixed signal verification challengesMixed signal verification challenges
Mixed signal verification challenges
 
Ph.D. Defence on "High power medium voltage dc/dc converter technology for D...
 Ph.D. Defence on "High power medium voltage dc/dc converter technology for D... Ph.D. Defence on "High power medium voltage dc/dc converter technology for D...
Ph.D. Defence on "High power medium voltage dc/dc converter technology for D...
 
VLSI Power in a Nutshell
VLSI Power in a NutshellVLSI Power in a Nutshell
VLSI Power in a Nutshell
 
Challenges of Parallel Simulation of Power Systems_english
Challenges of Parallel Simulation of Power Systems_englishChallenges of Parallel Simulation of Power Systems_english
Challenges of Parallel Simulation of Power Systems_english
 
Trends in Mixed Signal Validation
Trends in Mixed Signal ValidationTrends in Mixed Signal Validation
Trends in Mixed Signal Validation
 
A 1.2V 10-bit 165MSPS Video ADC
A 1.2V 10-bit 165MSPS Video ADCA 1.2V 10-bit 165MSPS Video ADC
A 1.2V 10-bit 165MSPS Video ADC
 
PRINT
PRINTPRINT
PRINT
 

More from DefconRussia

Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхSergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхDefconRussia
 
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...DefconRussia
 
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...DefconRussia
 
Anton Alexanenkov - Tor and Botnet C&C
Anton Alexanenkov -  Tor and Botnet C&C Anton Alexanenkov -  Tor and Botnet C&C
Anton Alexanenkov - Tor and Botnet C&C DefconRussia
 
Roman Korkikyan - Timing analysis workshop Part 2 Scary
Roman Korkikyan - Timing analysis workshop Part 2 ScaryRoman Korkikyan - Timing analysis workshop Part 2 Scary
Roman Korkikyan - Timing analysis workshop Part 2 ScaryDefconRussia
 
Roman Korkikyan - Timing analysis workshop Part 2 Practice
Roman Korkikyan - Timing analysis workshop Part 2 PracticeRoman Korkikyan - Timing analysis workshop Part 2 Practice
Roman Korkikyan - Timing analysis workshop Part 2 PracticeDefconRussia
 
Roman Korkikyan - Timing analysis workshop Part 1 Theory
Roman Korkikyan - Timing analysis workshop Part 1 TheoryRoman Korkikyan - Timing analysis workshop Part 1 Theory
Roman Korkikyan - Timing analysis workshop Part 1 TheoryDefconRussia
 
Peter Hlavaty - DBIFuzz
Peter Hlavaty - DBIFuzzPeter Hlavaty - DBIFuzz
Peter Hlavaty - DBIFuzzDefconRussia
 
Vadim Bardakov - AVR & MSP exploitation
Vadim Bardakov - AVR & MSP exploitationVadim Bardakov - AVR & MSP exploitation
Vadim Bardakov - AVR & MSP exploitationDefconRussia
 
Tomas Hlavacek - IP fragmentation attack on DNS
Tomas Hlavacek - IP fragmentation attack on DNSTomas Hlavacek - IP fragmentation attack on DNS
Tomas Hlavacek - IP fragmentation attack on DNSDefconRussia
 

More from DefconRussia (10)

Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхSergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
 
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
George Lagoda - Альтернативное использование вэб сервисов SharePoint со сторо...
 
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
Taras Tatarinov - Применение аппаратных закладок pwnie express на примере реа...
 
Anton Alexanenkov - Tor and Botnet C&C
Anton Alexanenkov -  Tor and Botnet C&C Anton Alexanenkov -  Tor and Botnet C&C
Anton Alexanenkov - Tor and Botnet C&C
 
Roman Korkikyan - Timing analysis workshop Part 2 Scary
Roman Korkikyan - Timing analysis workshop Part 2 ScaryRoman Korkikyan - Timing analysis workshop Part 2 Scary
Roman Korkikyan - Timing analysis workshop Part 2 Scary
 
Roman Korkikyan - Timing analysis workshop Part 2 Practice
Roman Korkikyan - Timing analysis workshop Part 2 PracticeRoman Korkikyan - Timing analysis workshop Part 2 Practice
Roman Korkikyan - Timing analysis workshop Part 2 Practice
 
Roman Korkikyan - Timing analysis workshop Part 1 Theory
Roman Korkikyan - Timing analysis workshop Part 1 TheoryRoman Korkikyan - Timing analysis workshop Part 1 Theory
Roman Korkikyan - Timing analysis workshop Part 1 Theory
 
Peter Hlavaty - DBIFuzz
Peter Hlavaty - DBIFuzzPeter Hlavaty - DBIFuzz
Peter Hlavaty - DBIFuzz
 
Vadim Bardakov - AVR & MSP exploitation
Vadim Bardakov - AVR & MSP exploitationVadim Bardakov - AVR & MSP exploitation
Vadim Bardakov - AVR & MSP exploitation
 
Tomas Hlavacek - IP fragmentation attack on DNS
Tomas Hlavacek - IP fragmentation attack on DNSTomas Hlavacek - IP fragmentation attack on DNS
Tomas Hlavacek - IP fragmentation attack on DNS
 

Recently uploaded

VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 

Recently uploaded (20)

VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 

[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC