SlideShare a Scribd company logo
HAKOVANJE WEB APLIKACIJA
GORAN KUNJADIĆ
EKSPERT ZA SAJBER BEZBEDNOST,
KRIPTOGRAFIJU I UPRAVLJANJE OBRADOM
PODATAKA O LIČNOSTI
AGENDA
• KARAKTERISTIKE BEZBEDNOSTI WEB APLIKACIJA
• TIPOVI NAPADA NA WEB APLIKACIJE
• TESTIRANJE BEZBEDNOSTI
KARAKTERISTIKE BEZBEDNOSTI WEB
APLIKACIJA
NEDAVNA WEB HAKOVANJA
UZROCI RIZIKA U WEB APLIKACIJAMA
• DIVELOPERI SU MALO (ILI UOPŠTE NISU) IZUČAVALI BEZBEDNOST;
• STRUČNJACI ZA BEZBEDNOST SE NE BAVE RAZVOJEM APLIKACIJA;
• KRATKI ROKOVI ZA RAZVOJ APLIKACIJA;
• COPY/PASTE KODA SA WEB LOKACIJA;
• PROGRAMSKI JEZICI KOJI SE LAKO KORISTE;
• NEDOSTATAK INTERNIH STANDARDA ZA KODIRANJE.
NAJVIŠE IZLOŽENA A NAJMANJE ZAŠTIĆENA
INFRASTRUKTURA
KARAKTERISTIKE RANJIVOSTI WEB APLIKACIJA
• RANJIVOST POSTOJI U APLIKACIJI A NE U OPERATIVNOM SISTEMU;
• JEDNOSTAVAN NAPAD JER SE ČESTO ZAHTEVA SAMO WEB BROWSER;
• SSL ŠIFROVANI SAOBRAĆAJ.
OWASP
• OPEN WEB APPLICATION SECURITY PROJECT (OWASP);
• ONLINE ZAJEDNICA KOJA OBEZBEĐUJE SLOBODNO DOSTUPNE ČLANKE,
METODOLOGIJE, DOKUMENTACIJU, ALATE I TEHNOLOGIJE U OBLASTI
BEZBEDNOSTI WEB APLIKACIJA;
• POŠTOVANJE OWASP PREPORUKA/STANDARDA OBEZBEĐUJE KONFIGURISANJE
BEZBEDNOSTI U SKLADU SA NAJBOLJOM PRAKSOM.
ALATI ZA HAKOVANJE
• KALI LINUX OS;
• METASPLOIT FRAMEWORK;
• EXPLOIT MODULE;
• PAYLOAD MODULE;
WMAP WEB SCANNER JE MODUL KOJI SE KORISTI ZA OTKRIVANJE RANJIVOSTI WEB
APLIKACIJA;
NAKON SKENIRANJA SE KREIRA SKRIPTA ZA NAPAD KOJA POKUŠAVA DA ISKORISTI
UOČENU RANJIVOST.
TIPOVI NAPADA NA WEB APLIKACIJE
SQL INJECTION
SQL INJECTION NAPAD SE IZVRŠAVA KADA SE OD KORISNIKA ZAHTEVA UNOS KAO
ŠTO SU USERNAME I PASSWORD. UMESTO TRAŽENIH PARAMETARA NAPADAČ
UNOSI SQL KOD KOJI ĆE SE IZVRŠITI NAD NAPADNUTOM BAZOM PODATAKA
OTKRIVAJUĆI SADRŽAJ BAZE.
SELECT * FROM USERS WHERE NAME = 'A’;
DROP TABLE USERS;
SELECT * FROM USERINFO WHERE 'T' = 'T';
CROSS-SITE SCRIPTING (XSS)
• NA OVAJ NAČIN IZVODI SE OKO 40% NAPADA;
• JEDNOSTAVAN NAPAD KOJI MOGU IZVRŠITI I OSOBE KOJE NEMAJU PUNO
ZNANJA TAKO ŠTO ĆE KORISTITI GOTOVE SKRIPTE;
• HAKOVANJE VIŠE WEB LOKACIJA CILJA KORISNIKE WEB LOKACIJE UMESTO NA
SAMU WEB APLIKACIJU. NAPADAČ UBACUJE DEO KODA NA WEB LOKACIJU,
KOJU ZATIM IZVRŠAVA KORISNIK WEB LOKACIJE. KOD MOŽE UGROZITI
KORISNIČKE NALOGE, AKTIVIRATI MALICIOZNI SOFTVER ILI IZMENITI SADRŽAJ
WEB LOKACIJE KAKO BI KORISNIKA PREVARIO I NAVEO GA DA OTKRIJE SVOJE
KREDENCIJALE ILI OSETLJIVE PODATKE.
PATH (OR DIRECTORY) TRAVERSAL
• PATH TRAVERSAL NAPADI CILJAJU ROOT WEB FOLDER RADI PRISTUPA
NEOVLAŠĆENIM DATOTEKAMA ILI FOLDERIMA;
• NAPADAČ POKUŠAVA DA IZVRŠI ESKALACIJU PRAVA KAKO BI MOGAO DA U
POTPUNOSTI RASPOLAŽE FOLDERIMA;
• UKOLIKO JE NAPAD USPEŠAN MOGU BITI UGROŽENI: PRISTUP WEB LOKACIJI,
KONFIGURACIONI FAJLOVI, BAZE PODATAKA I DRUGE WEB LOKACIJE KOJE SE
NALAZE NA ISTOM FIZIČKOM (ILI VIRTUELNOM) SERVERU.
DISTRIBUTED DENIAL-OF-SERVICE (DDOS)
MAN-IN-THE-MIDDLE ATTACK
Brute Force Attack
BRUTE FORCE ATTACK
• BRUTE FORCE ATTACK JE VRLO JEDNOSTAVAN METOD ZA PRISTUP PODACIMA
ZA PRIJAVU NA WEB APLIKACIJU;
• NAPADAČ POKUŠAVA DA POGODI KOMBINACIJU KORISNIČKOG IMENA I LOZINKE
ZA PRISTUP KORISNIČKOM NALOGU;
• VEOMA JE DUGOTRAJAN PROCES OSIM U SLUČAJU KADA SU LOZINKE
JEDNOSTAVNE, ŠTO NAJČEŠĆE JESU;
• NAJBOLJI NAČIN ZAŠTITE PODATAKA ZA PRIJAVU JE KREIRANJE JAKE LOZINKE ILI
UPOTREBA DVOFAKTORSKE AUTENTIFIKACIJE (2FA).
PHISHING
• LAŽNO PREDSTAVLJANJE JE METOD NAPADA KOJI NIJE DIREKTNO USMEREN NA
WEB LOKACIJE ALI SE ČESTO KORISTI;
• PRREMA IZVEŠTAJU FBI RADI SE NAJČEŠĆEM OBLIKU INTERNET KRIMINALA KOJI
SE IZVODI METODOM SOCIJALNOG INŽENJERINGA;
• STANDARDNI ALAT KOJI SE KORISTI U POKUŠAJIMA KRAĐE IDENTITETA JE E –
MAIL;
• POZNAT JE NAPAD 419 IAKO DOBRO DOKUMENTOVAN I DALJE FUNKCIONIŠE;
• NAJBOLJA ODBRANA JE PODIZANJE BEZBEDNOSNE SVESTI.
TESTIRANJE BEZBEDNOSTI
TROŠKOVI OTKLANJANJA BEZBEDNOSNIH
GREŠAKA
KLASIČNO TESTIRANJE BEZBEDNOSTI
TESTIRANJE BEZBEDNOSTI APLIKACIJA
HVALA NA PAŽNJI!
Goran Kunjadić
goran.kunjadic@gmail.com

More Related Content

What's hot

Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicBlue Coat
 
Owasp top ten 2017
Owasp top ten   2017Owasp top ten   2017
Owasp top ten 2017
AnukaJinadasa
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
 
Hiding In Plain Sight – Protect Against Bad Hashes
Hiding In Plain Sight – Protect Against Bad HashesHiding In Plain Sight – Protect Against Bad Hashes
Hiding In Plain Sight – Protect Against Bad Hashes
Tripwire
 
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber BattlefrontVices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Ory Segal
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
Introduction to Security Testing
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security Testing
vodQA
 
Pharming attack
Pharming attackPharming attack
Pharming attack
Akshay Surve
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
NowSecure
 
5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks
Pentest-Tools.com
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10
Pawel Rzepa
 
Hardening Enterprise Apache
Hardening Enterprise ApacheHardening Enterprise Apache
Hardening Enterprise Apacheguestd9aa5
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
Cisco do Brasil
 
Gov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior AnalyticsGov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
Splunk
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
 

What's hot (16)

Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
Owasp top ten 2017
Owasp top ten   2017Owasp top ten   2017
Owasp top ten 2017
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
Hiding In Plain Sight – Protect Against Bad Hashes
Hiding In Plain Sight – Protect Against Bad HashesHiding In Plain Sight – Protect Against Bad Hashes
Hiding In Plain Sight – Protect Against Bad Hashes
 
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber BattlefrontVices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
OWASP Top 10 for Mobile
 
Introduction to Security Testing
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security Testing
 
Pharming attack
Pharming attackPharming attack
Pharming attack
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10
 
Hardening Enterprise Apache
Hardening Enterprise ApacheHardening Enterprise Apache
Hardening Enterprise Apache
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
 
Gov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior AnalyticsGov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
 

Similar to Developers’ mDay 2021: Goran Kunjadić, Cyber security, cryptography and DPO expert – Cybersecurity: Hakovanje Web aplikacija

Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)
Shrutirupa Banerjiee
 
Web attacks using obfuscated script
Web attacks using  obfuscated scriptWeb attacks using  obfuscated script
Web attacks using obfuscated script
Amol Kamble
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
Imperva Incapsula
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
Ahmed Sherif
 
Security testautomation
Security testautomationSecurity testautomation
Security testautomation
Linkesh Kanna Velu
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingAkash Mahajan
 
Web Site vulnerability Sales and Consulting
Web Site vulnerability Sales and ConsultingWeb Site vulnerability Sales and Consulting
Web Site vulnerability Sales and Consultingguest4cee27ac
 
WebApp_to_Container_Security.pdf
WebApp_to_Container_Security.pdfWebApp_to_Container_Security.pdf
WebApp_to_Container_Security.pdf
Anna Pasupathy, CISSP
 
Secure Form Processing and Protection - Sunshine PHP 2015
Secure Form Processing and Protection - Sunshine PHP 2015Secure Form Processing and Protection - Sunshine PHP 2015
Secure Form Processing and Protection - Sunshine PHP 2015
Joe Ferguson
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
Ravi Aggarwal
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure WebsiteImperva Incapsula
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
Alert Logic
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Eric Kolb
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
Philippe Gamache
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
Philippe Gamache
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
karthikvcyber
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
MarketingArrowECS_CZ
 
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
Inspirisys Solutions Limited
 

Similar to Developers’ mDay 2021: Goran Kunjadić, Cyber security, cryptography and DPO expert – Cybersecurity: Hakovanje Web aplikacija (20)

Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)
 
Web attacks using obfuscated script
Web attacks using  obfuscated scriptWeb attacks using  obfuscated script
Web attacks using obfuscated script
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
 
Security testautomation
Security testautomationSecurity testautomation
Security testautomation
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
 
Web Site vulnerability Sales and Consulting
Web Site vulnerability Sales and ConsultingWeb Site vulnerability Sales and Consulting
Web Site vulnerability Sales and Consulting
 
WebApp_to_Container_Security.pdf
WebApp_to_Container_Security.pdfWebApp_to_Container_Security.pdf
WebApp_to_Container_Security.pdf
 
Secure Form Processing and Protection - Sunshine PHP 2015
Secure Form Processing and Protection - Sunshine PHP 2015Secure Form Processing and Protection - Sunshine PHP 2015
Secure Form Processing and Protection - Sunshine PHP 2015
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
 
Web Security
Web SecurityWeb Security
Web Security
 

More from mCloud

Developers’ mDay 2021: Robert Juhas, SimpleTask – Should I run my own blockc...
Developers’ mDay 2021: Robert Juhas, SimpleTask –  Should I run my own blockc...Developers’ mDay 2021: Robert Juhas, SimpleTask –  Should I run my own blockc...
Developers’ mDay 2021: Robert Juhas, SimpleTask – Should I run my own blockc...
mCloud
 
Developers’ mDay 2021: Andrea Bjelogrlić, Sysbee – Tips, tricks and debugging...
Developers’ mDay 2021: Andrea Bjelogrlić, Sysbee – Tips, tricks and debugging...Developers’ mDay 2021: Andrea Bjelogrlić, Sysbee – Tips, tricks and debugging...
Developers’ mDay 2021: Andrea Bjelogrlić, Sysbee – Tips, tricks and debugging...
mCloud
 
Developers’ mDay 2021: Igor Spasić, Oblac – Jodd, jedna open-source priča
Developers’ mDay 2021: Igor Spasić, Oblac – Jodd, jedna open-source pričaDevelopers’ mDay 2021: Igor Spasić, Oblac – Jodd, jedna open-source priča
Developers’ mDay 2021: Igor Spasić, Oblac – Jodd, jedna open-source priča
mCloud
 
Developers’ mDay 2021: Mladen Janjetović, Laravel Srbija – Laravel Awesome
Developers’ mDay 2021: Mladen Janjetović, Laravel Srbija – Laravel AwesomeDevelopers’ mDay 2021: Mladen Janjetović, Laravel Srbija – Laravel Awesome
Developers’ mDay 2021: Mladen Janjetović, Laravel Srbija – Laravel Awesome
mCloud
 
Developers’ mDay 2021: Nikola Krgović, Twin Star Systems – CentOS i šta dalje
Developers’ mDay 2021: Nikola Krgović, Twin Star Systems – CentOS i šta daljeDevelopers’ mDay 2021: Nikola Krgović, Twin Star Systems – CentOS i šta dalje
Developers’ mDay 2021: Nikola Krgović, Twin Star Systems – CentOS i šta dalje
mCloud
 
Developers’ mDay 2021: Nebojša Kamber, Infostud – SQL vs noSQL
Developers’ mDay 2021: Nebojša Kamber, Infostud – SQL vs noSQLDevelopers’ mDay 2021: Nebojša Kamber, Infostud – SQL vs noSQL
Developers’ mDay 2021: Nebojša Kamber, Infostud – SQL vs noSQL
mCloud
 
Developers’ mDay 2021: Bogdan Kecman, Oracle – MySQL nekad i sad
Developers’ mDay 2021: Bogdan Kecman, Oracle – MySQL nekad i sadDevelopers’ mDay 2021: Bogdan Kecman, Oracle – MySQL nekad i sad
Developers’ mDay 2021: Bogdan Kecman, Oracle – MySQL nekad i sad
mCloud
 
Developers’ mDay 2021: Jelena Opačić, mCloud – Dobrodošlica
Developers’ mDay 2021: Jelena Opačić, mCloud – DobrodošlicaDevelopers’ mDay 2021: Jelena Opačić, mCloud – Dobrodošlica
Developers’ mDay 2021: Jelena Opačić, mCloud – Dobrodošlica
mCloud
 
Developers’ mDay 2019. - Zvonimir Gembec, Sysbee – Developers vs Sysadmins – ...
Developers’ mDay 2019. - Zvonimir Gembec, Sysbee – Developers vs Sysadmins – ...Developers’ mDay 2019. - Zvonimir Gembec, Sysbee – Developers vs Sysadmins – ...
Developers’ mDay 2019. - Zvonimir Gembec, Sysbee – Developers vs Sysadmins – ...
mCloud
 
Developers’ mDay 2019. - Dijana Milutinović, RNIDS – Kako se kalio domen
Developers’ mDay 2019. -  Dijana Milutinović, RNIDS – Kako se kalio domenDevelopers’ mDay 2019. -  Dijana Milutinović, RNIDS – Kako se kalio domen
Developers’ mDay 2019. - Dijana Milutinović, RNIDS – Kako se kalio domen
mCloud
 
Developers’ mDay 2019. - Bogdan Kecman, Oracle – MySQL 8.0 – why upgrade
Developers’ mDay 2019. - Bogdan Kecman, Oracle – MySQL 8.0 – why upgradeDevelopers’ mDay 2019. - Bogdan Kecman, Oracle – MySQL 8.0 – why upgrade
Developers’ mDay 2019. - Bogdan Kecman, Oracle – MySQL 8.0 – why upgrade
mCloud
 
Developers’ mDay 2019. - Rastko Vasiljević, SuperAdmins – Infrastructure as c...
Developers’ mDay 2019. - Rastko Vasiljević, SuperAdmins – Infrastructure as c...Developers’ mDay 2019. - Rastko Vasiljević, SuperAdmins – Infrastructure as c...
Developers’ mDay 2019. - Rastko Vasiljević, SuperAdmins – Infrastructure as c...
mCloud
 
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivityDevelopers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
mCloud
 
Developers’ mDay 2019. - Adrian Smijulj, Webiny – Server-side rendering u Ser...
Developers’ mDay 2019. - Adrian Smijulj, Webiny – Server-side rendering u Ser...Developers’ mDay 2019. - Adrian Smijulj, Webiny – Server-side rendering u Ser...
Developers’ mDay 2019. - Adrian Smijulj, Webiny – Server-side rendering u Ser...
mCloud
 
Developers’ mDay 2019. - Nikola Krgović, Twin Star Systems – Big Data for Dev...
Developers’ mDay 2019. - Nikola Krgović, Twin Star Systems – Big Data for Dev...Developers’ mDay 2019. - Nikola Krgović, Twin Star Systems – Big Data for Dev...
Developers’ mDay 2019. - Nikola Krgović, Twin Star Systems – Big Data for Dev...
mCloud
 
Developers’ mDay 2019. - Dragutin Ćirković, mCloud – HTTP/3
Developers’ mDay 2019. - Dragutin Ćirković, mCloud – HTTP/3Developers’ mDay 2019. - Dragutin Ćirković, mCloud – HTTP/3
Developers’ mDay 2019. - Dragutin Ćirković, mCloud – HTTP/3
mCloud
 
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux –  Unified IoT Pl...Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux –  Unified IoT Pl...
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
mCloud
 
Developers’ mDay u Banjoj Luci - Jelena Opačić, mCloud – Dobrodošlica
Developers’ mDay u Banjoj Luci - Jelena Opačić, mCloud – DobrodošlicaDevelopers’ mDay u Banjoj Luci - Jelena Opačić, mCloud – Dobrodošlica
Developers’ mDay u Banjoj Luci - Jelena Opačić, mCloud – Dobrodošlica
mCloud
 
Developers’ mDay u Banjoj Luci - Duško Bajić, Kotlin User Group Bosnia – Kotl...
Developers’ mDay u Banjoj Luci - Duško Bajić, Kotlin User Group Bosnia – Kotl...Developers’ mDay u Banjoj Luci - Duško Bajić, Kotlin User Group Bosnia – Kotl...
Developers’ mDay u Banjoj Luci - Duško Bajić, Kotlin User Group Bosnia – Kotl...
mCloud
 
Developers’ mDay u Banjoj Luci - Ivan Đukić, ECD, Blockchain & Cryptocurrency...
Developers’ mDay u Banjoj Luci - Ivan Đukić, ECD, Blockchain & Cryptocurrency...Developers’ mDay u Banjoj Luci - Ivan Đukić, ECD, Blockchain & Cryptocurrency...
Developers’ mDay u Banjoj Luci - Ivan Đukić, ECD, Blockchain & Cryptocurrency...
mCloud
 

More from mCloud (20)

Developers’ mDay 2021: Robert Juhas, SimpleTask – Should I run my own blockc...
Developers’ mDay 2021: Robert Juhas, SimpleTask –  Should I run my own blockc...Developers’ mDay 2021: Robert Juhas, SimpleTask –  Should I run my own blockc...
Developers’ mDay 2021: Robert Juhas, SimpleTask – Should I run my own blockc...
 
Developers’ mDay 2021: Andrea Bjelogrlić, Sysbee – Tips, tricks and debugging...
Developers’ mDay 2021: Andrea Bjelogrlić, Sysbee – Tips, tricks and debugging...Developers’ mDay 2021: Andrea Bjelogrlić, Sysbee – Tips, tricks and debugging...
Developers’ mDay 2021: Andrea Bjelogrlić, Sysbee – Tips, tricks and debugging...
 
Developers’ mDay 2021: Igor Spasić, Oblac – Jodd, jedna open-source priča
Developers’ mDay 2021: Igor Spasić, Oblac – Jodd, jedna open-source pričaDevelopers’ mDay 2021: Igor Spasić, Oblac – Jodd, jedna open-source priča
Developers’ mDay 2021: Igor Spasić, Oblac – Jodd, jedna open-source priča
 
Developers’ mDay 2021: Mladen Janjetović, Laravel Srbija – Laravel Awesome
Developers’ mDay 2021: Mladen Janjetović, Laravel Srbija – Laravel AwesomeDevelopers’ mDay 2021: Mladen Janjetović, Laravel Srbija – Laravel Awesome
Developers’ mDay 2021: Mladen Janjetović, Laravel Srbija – Laravel Awesome
 
Developers’ mDay 2021: Nikola Krgović, Twin Star Systems – CentOS i šta dalje
Developers’ mDay 2021: Nikola Krgović, Twin Star Systems – CentOS i šta daljeDevelopers’ mDay 2021: Nikola Krgović, Twin Star Systems – CentOS i šta dalje
Developers’ mDay 2021: Nikola Krgović, Twin Star Systems – CentOS i šta dalje
 
Developers’ mDay 2021: Nebojša Kamber, Infostud – SQL vs noSQL
Developers’ mDay 2021: Nebojša Kamber, Infostud – SQL vs noSQLDevelopers’ mDay 2021: Nebojša Kamber, Infostud – SQL vs noSQL
Developers’ mDay 2021: Nebojša Kamber, Infostud – SQL vs noSQL
 
Developers’ mDay 2021: Bogdan Kecman, Oracle – MySQL nekad i sad
Developers’ mDay 2021: Bogdan Kecman, Oracle – MySQL nekad i sadDevelopers’ mDay 2021: Bogdan Kecman, Oracle – MySQL nekad i sad
Developers’ mDay 2021: Bogdan Kecman, Oracle – MySQL nekad i sad
 
Developers’ mDay 2021: Jelena Opačić, mCloud – Dobrodošlica
Developers’ mDay 2021: Jelena Opačić, mCloud – DobrodošlicaDevelopers’ mDay 2021: Jelena Opačić, mCloud – Dobrodošlica
Developers’ mDay 2021: Jelena Opačić, mCloud – Dobrodošlica
 
Developers’ mDay 2019. - Zvonimir Gembec, Sysbee – Developers vs Sysadmins – ...
Developers’ mDay 2019. - Zvonimir Gembec, Sysbee – Developers vs Sysadmins – ...Developers’ mDay 2019. - Zvonimir Gembec, Sysbee – Developers vs Sysadmins – ...
Developers’ mDay 2019. - Zvonimir Gembec, Sysbee – Developers vs Sysadmins – ...
 
Developers’ mDay 2019. - Dijana Milutinović, RNIDS – Kako se kalio domen
Developers’ mDay 2019. -  Dijana Milutinović, RNIDS – Kako se kalio domenDevelopers’ mDay 2019. -  Dijana Milutinović, RNIDS – Kako se kalio domen
Developers’ mDay 2019. - Dijana Milutinović, RNIDS – Kako se kalio domen
 
Developers’ mDay 2019. - Bogdan Kecman, Oracle – MySQL 8.0 – why upgrade
Developers’ mDay 2019. - Bogdan Kecman, Oracle – MySQL 8.0 – why upgradeDevelopers’ mDay 2019. - Bogdan Kecman, Oracle – MySQL 8.0 – why upgrade
Developers’ mDay 2019. - Bogdan Kecman, Oracle – MySQL 8.0 – why upgrade
 
Developers’ mDay 2019. - Rastko Vasiljević, SuperAdmins – Infrastructure as c...
Developers’ mDay 2019. - Rastko Vasiljević, SuperAdmins – Infrastructure as c...Developers’ mDay 2019. - Rastko Vasiljević, SuperAdmins – Infrastructure as c...
Developers’ mDay 2019. - Rastko Vasiljević, SuperAdmins – Infrastructure as c...
 
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivityDevelopers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
Developers’ mDay 2019. - Dejan Bosanac, Red Hat – Cloud scale IoT connectivity
 
Developers’ mDay 2019. - Adrian Smijulj, Webiny – Server-side rendering u Ser...
Developers’ mDay 2019. - Adrian Smijulj, Webiny – Server-side rendering u Ser...Developers’ mDay 2019. - Adrian Smijulj, Webiny – Server-side rendering u Ser...
Developers’ mDay 2019. - Adrian Smijulj, Webiny – Server-side rendering u Ser...
 
Developers’ mDay 2019. - Nikola Krgović, Twin Star Systems – Big Data for Dev...
Developers’ mDay 2019. - Nikola Krgović, Twin Star Systems – Big Data for Dev...Developers’ mDay 2019. - Nikola Krgović, Twin Star Systems – Big Data for Dev...
Developers’ mDay 2019. - Nikola Krgović, Twin Star Systems – Big Data for Dev...
 
Developers’ mDay 2019. - Dragutin Ćirković, mCloud – HTTP/3
Developers’ mDay 2019. - Dragutin Ćirković, mCloud – HTTP/3Developers’ mDay 2019. - Dragutin Ćirković, mCloud – HTTP/3
Developers’ mDay 2019. - Dragutin Ćirković, mCloud – HTTP/3
 
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux –  Unified IoT Pl...Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux –  Unified IoT Pl...
Developers’ mDay u Banjoj Luci - Janko Isidorović, Mainflux – Unified IoT Pl...
 
Developers’ mDay u Banjoj Luci - Jelena Opačić, mCloud – Dobrodošlica
Developers’ mDay u Banjoj Luci - Jelena Opačić, mCloud – DobrodošlicaDevelopers’ mDay u Banjoj Luci - Jelena Opačić, mCloud – Dobrodošlica
Developers’ mDay u Banjoj Luci - Jelena Opačić, mCloud – Dobrodošlica
 
Developers’ mDay u Banjoj Luci - Duško Bajić, Kotlin User Group Bosnia – Kotl...
Developers’ mDay u Banjoj Luci - Duško Bajić, Kotlin User Group Bosnia – Kotl...Developers’ mDay u Banjoj Luci - Duško Bajić, Kotlin User Group Bosnia – Kotl...
Developers’ mDay u Banjoj Luci - Duško Bajić, Kotlin User Group Bosnia – Kotl...
 
Developers’ mDay u Banjoj Luci - Ivan Đukić, ECD, Blockchain & Cryptocurrency...
Developers’ mDay u Banjoj Luci - Ivan Đukić, ECD, Blockchain & Cryptocurrency...Developers’ mDay u Banjoj Luci - Ivan Đukić, ECD, Blockchain & Cryptocurrency...
Developers’ mDay u Banjoj Luci - Ivan Đukić, ECD, Blockchain & Cryptocurrency...
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Developers’ mDay 2021: Goran Kunjadić, Cyber security, cryptography and DPO expert – Cybersecurity: Hakovanje Web aplikacija

  • 1. HAKOVANJE WEB APLIKACIJA GORAN KUNJADIĆ EKSPERT ZA SAJBER BEZBEDNOST, KRIPTOGRAFIJU I UPRAVLJANJE OBRADOM PODATAKA O LIČNOSTI
  • 2. AGENDA • KARAKTERISTIKE BEZBEDNOSTI WEB APLIKACIJA • TIPOVI NAPADA NA WEB APLIKACIJE • TESTIRANJE BEZBEDNOSTI
  • 5. UZROCI RIZIKA U WEB APLIKACIJAMA • DIVELOPERI SU MALO (ILI UOPŠTE NISU) IZUČAVALI BEZBEDNOST; • STRUČNJACI ZA BEZBEDNOST SE NE BAVE RAZVOJEM APLIKACIJA; • KRATKI ROKOVI ZA RAZVOJ APLIKACIJA; • COPY/PASTE KODA SA WEB LOKACIJA; • PROGRAMSKI JEZICI KOJI SE LAKO KORISTE; • NEDOSTATAK INTERNIH STANDARDA ZA KODIRANJE.
  • 6. NAJVIŠE IZLOŽENA A NAJMANJE ZAŠTIĆENA INFRASTRUKTURA
  • 7. KARAKTERISTIKE RANJIVOSTI WEB APLIKACIJA • RANJIVOST POSTOJI U APLIKACIJI A NE U OPERATIVNOM SISTEMU; • JEDNOSTAVAN NAPAD JER SE ČESTO ZAHTEVA SAMO WEB BROWSER; • SSL ŠIFROVANI SAOBRAĆAJ.
  • 8. OWASP • OPEN WEB APPLICATION SECURITY PROJECT (OWASP); • ONLINE ZAJEDNICA KOJA OBEZBEĐUJE SLOBODNO DOSTUPNE ČLANKE, METODOLOGIJE, DOKUMENTACIJU, ALATE I TEHNOLOGIJE U OBLASTI BEZBEDNOSTI WEB APLIKACIJA; • POŠTOVANJE OWASP PREPORUKA/STANDARDA OBEZBEĐUJE KONFIGURISANJE BEZBEDNOSTI U SKLADU SA NAJBOLJOM PRAKSOM.
  • 9. ALATI ZA HAKOVANJE • KALI LINUX OS; • METASPLOIT FRAMEWORK; • EXPLOIT MODULE; • PAYLOAD MODULE; WMAP WEB SCANNER JE MODUL KOJI SE KORISTI ZA OTKRIVANJE RANJIVOSTI WEB APLIKACIJA; NAKON SKENIRANJA SE KREIRA SKRIPTA ZA NAPAD KOJA POKUŠAVA DA ISKORISTI UOČENU RANJIVOST.
  • 10. TIPOVI NAPADA NA WEB APLIKACIJE
  • 11. SQL INJECTION SQL INJECTION NAPAD SE IZVRŠAVA KADA SE OD KORISNIKA ZAHTEVA UNOS KAO ŠTO SU USERNAME I PASSWORD. UMESTO TRAŽENIH PARAMETARA NAPADAČ UNOSI SQL KOD KOJI ĆE SE IZVRŠITI NAD NAPADNUTOM BAZOM PODATAKA OTKRIVAJUĆI SADRŽAJ BAZE. SELECT * FROM USERS WHERE NAME = 'A’; DROP TABLE USERS; SELECT * FROM USERINFO WHERE 'T' = 'T';
  • 12. CROSS-SITE SCRIPTING (XSS) • NA OVAJ NAČIN IZVODI SE OKO 40% NAPADA; • JEDNOSTAVAN NAPAD KOJI MOGU IZVRŠITI I OSOBE KOJE NEMAJU PUNO ZNANJA TAKO ŠTO ĆE KORISTITI GOTOVE SKRIPTE; • HAKOVANJE VIŠE WEB LOKACIJA CILJA KORISNIKE WEB LOKACIJE UMESTO NA SAMU WEB APLIKACIJU. NAPADAČ UBACUJE DEO KODA NA WEB LOKACIJU, KOJU ZATIM IZVRŠAVA KORISNIK WEB LOKACIJE. KOD MOŽE UGROZITI KORISNIČKE NALOGE, AKTIVIRATI MALICIOZNI SOFTVER ILI IZMENITI SADRŽAJ WEB LOKACIJE KAKO BI KORISNIKA PREVARIO I NAVEO GA DA OTKRIJE SVOJE KREDENCIJALE ILI OSETLJIVE PODATKE.
  • 13. PATH (OR DIRECTORY) TRAVERSAL • PATH TRAVERSAL NAPADI CILJAJU ROOT WEB FOLDER RADI PRISTUPA NEOVLAŠĆENIM DATOTEKAMA ILI FOLDERIMA; • NAPADAČ POKUŠAVA DA IZVRŠI ESKALACIJU PRAVA KAKO BI MOGAO DA U POTPUNOSTI RASPOLAŽE FOLDERIMA; • UKOLIKO JE NAPAD USPEŠAN MOGU BITI UGROŽENI: PRISTUP WEB LOKACIJI, KONFIGURACIONI FAJLOVI, BAZE PODATAKA I DRUGE WEB LOKACIJE KOJE SE NALAZE NA ISTOM FIZIČKOM (ILI VIRTUELNOM) SERVERU.
  • 16. BRUTE FORCE ATTACK • BRUTE FORCE ATTACK JE VRLO JEDNOSTAVAN METOD ZA PRISTUP PODACIMA ZA PRIJAVU NA WEB APLIKACIJU; • NAPADAČ POKUŠAVA DA POGODI KOMBINACIJU KORISNIČKOG IMENA I LOZINKE ZA PRISTUP KORISNIČKOM NALOGU; • VEOMA JE DUGOTRAJAN PROCES OSIM U SLUČAJU KADA SU LOZINKE JEDNOSTAVNE, ŠTO NAJČEŠĆE JESU; • NAJBOLJI NAČIN ZAŠTITE PODATAKA ZA PRIJAVU JE KREIRANJE JAKE LOZINKE ILI UPOTREBA DVOFAKTORSKE AUTENTIFIKACIJE (2FA).
  • 17. PHISHING • LAŽNO PREDSTAVLJANJE JE METOD NAPADA KOJI NIJE DIREKTNO USMEREN NA WEB LOKACIJE ALI SE ČESTO KORISTI; • PRREMA IZVEŠTAJU FBI RADI SE NAJČEŠĆEM OBLIKU INTERNET KRIMINALA KOJI SE IZVODI METODOM SOCIJALNOG INŽENJERINGA; • STANDARDNI ALAT KOJI SE KORISTI U POKUŠAJIMA KRAĐE IDENTITETA JE E – MAIL; • POZNAT JE NAPAD 419 IAKO DOBRO DOKUMENTOVAN I DALJE FUNKCIONIŠE; • NAJBOLJA ODBRANA JE PODIZANJE BEZBEDNOSNE SVESTI.
  • 22. HVALA NA PAŽNJI! Goran Kunjadić goran.kunjadic@gmail.com