SlideShare a Scribd company logo
Hacking	
the	world	
	
One	byte	at	a	4me	
©	2016	Asian	School	of	Cyber	Laws	
Version	date:	20th	Jan,	2016	
www.asianlaws.org
h"p://www.example.com/ajax/emu/end.php?
eid=AQLLhnt40jDTOPvY0l2NCXvgRt6ldoZYIRxTywNr8ywdsU6nUdZT
APTMvXD5cr56WavhJDiacFJlZ5B2rzWIUhchRHwlx_sU7diy0hk8GqAk
CemLYAsrBnFSPNsQuaCeaCUcQ_029eo_1CSvZk0qygVSApdKZ4lqcLR
mCXyPZVkcyUcHve2oVcpsfRVXgoA0PtNGbB08ZerLU6QeddP8fqwIK
UZYdMoHE1VCPFzbfuFYf6jryIswh3O6S55ShTcz16aZEPSNK5aPoQAP
DBzstafCvPQpZbgf1IIYyhsJ4B6MSEXDZgIRrjCw2YyieiVuGfI5G99uvw
NNVs1NZK2AWONwXW1MhQs3hFafqyIdqBKwalC1cZiQW_2zNvL71
2Ggi6St0DRenYFYvZbrqDUH_eMNZ8We4wA9u7n1nCUhgALP2mQ1
6CMysOfnjwKc5gggKdpQ8yZZHFQTmzZHWodYDFZNryNOjQX_4xXSq
owIr3cZBri8tFYmVD5MPPKOp8Rp1ngrmvwWTMnpvdlkTEyWkeCmn
LQcZxdywJow83iEaRMAAgb0okwhMRq3KcVy3gfqN4j2SVpnlzA26Uo
8aFGJ0uKF6cd4HgxVnPZCuRx6vxZ2deDkeaLv5NdfKFdmShHHqYpqSz
Kh5WwJyNzEViJzgs0bDv7tH9GJEjjgkRAKIRQSEge_SLSditXSRss2QER
WUp0XB6O36uLgnkSYVHIwz9nZqCJ4rE_chrDGuymKhFPCLfLSgOVd9
85FQDUHzC8GohIpyUTRIMaiRCv9t0dyT37I5bZ6asT6caBhhO3StEDk
NHNhsBHRxboT4Lp3x60P3&f=0&ui=6003062662923id_4e42070adb
bf67d92329417&en=fad_videoplay&a=
h"p://www.example.com.ajax.mul.end.ph/end.php?
eid=AQLLhnt40jDTOPvY0l2NCXvgRt6ldoZYIRxTywNr8ywdsU6nUdZT
APTMvXD5cr56WavhJDiacFJlZ5B2rzWIUhchRHwlx_sU7diy0hk8GqAk
CemLYAsrBnFSPNsQuaCeaCUcQ_029eo_1CSvZk0qygVSApdKZ4lqcLR
mCXyPZVkcyUcHve2oVcpsfRVXgoA0PtNGbB08ZerLU6QeddP8fqwIK
UZYdMoHE1VCPFzbfuFYf6jryIswh3O6S55ShTcz16aZEPSNK5aPoQAP
DBzstafCvPQpZbgf1IIYyhsJ4B6MSEXDZgIRrjCw2YyieiVuGfI5G99uvw
NNVs1NZK2AWONwXW1MhQs3hFafqyIdqBKwalC1cZiQW_2zNvL71
2Ggi6St0DRenYFYvZbrqDUH_eMNZ8We4wA9u7n1nCUhgALP2mQ1
6CMysOfnjwKc5gggKdpQ8yZZHFQTmzZHWodYDFZNryNOjQX_4xXSq
owIr3cZBri8tFYmVD5MPPKOp8Rp1ngrmvwWTMnpvdlkTEyWkeCmn
LQcZxdywJow83iEaRMAAgb0okwhMRq3KcVy3gfqN4j2SVpnlzA26Uo
8aFGJ0uKF6cd4HgxVnPZCuRx6vxZ2deDkeaLv5NdfKFdmShHHqYpqSz
Kh5WwJyNzEViJzgs0bDv7tH9GJEjjgkRAKIRQSEge_SLSditXSRss2QER
WUp0XB6O36uLgnkSYVHIwz9nZqCJ4rE_chrDGuymKhFPCLfLSgOVd9
85FQDUHzC8GohIpyUTRIMaiRCv9t0dyT37I5bZ6asT6caBhhO3StEDk
NHNhsBHRxboT4Lp3x60P3&f=0&ui=6003062662923id_4e42070adb
bf67d92329417&en=fad_videoplay&a=
h"p://www.example.com.ajax.mul.end.ph/end.php?
eid=AQLLhnt40jDTOPvY0l2NCXvgRt6ldoZYIRxTywNr8ywdsU6nUdZT
APTMvXD5cr56WavhJDiacFJlZ5B2rzWIUhchRHwlx_sU7diy0hk8GqAk
CemLYAsrBnFSPNsQuaCeaCUcQ_029eo_1CSvZk0qygVSApdKZ4lqcLR
mCXyPZVkcyUcHve2oVcpsfRVXgoA0PtNGbB08ZerLU6QeddP8fqwIK
UZYdMoHE1VCPFzbfuFYf6jryIswh3O6S55ShTcz16aZEPSNK5aPoQAP
DBzstafCvPQpZbgf1IIYyhsJ4B6MSEXDZgIRrjCw2YyieiVuGfI5G99uvw
NNVs1NZK2AWONwXW1MhQs3hFafqyIdqBKwalC1cZiQW_2zNvL71
2Ggi6St0DRenYFYvZbrqDUH_eMNZ8We4wA9u7n1nCUhgALP2mQ1
6CMysOfnjwKc5gggKdpQ8yZZHFQTmzZHWodYDFZNryNOjQX_4xXSq
owIr3cZBri8tFYmVD5MPPKOp8Rp1ngrmvwWTMnpvdlkTEyWkeCmn
LQcZxdywJow83iEaRMAAgb0okwhMRq3KcVy3gfqN4j2SVpnlzA26Uo
8aFGJ0uKF6cd4HgxVnPZCuRx6vxZ2deDkeaLv5NdfKFdmShHHqYpqSz
Kh5WwJyNzEViJzgs0bDv7tH9GJEjjgkRAKIRQSEge_SLSditXSRss2QER
WUp0XB6O36uLgnkSYVHIwz9nZqCJ4rE_chrDGuymKhFPCLfLSgOVd9
85FQDUHzC8GohIpyUTRIMaiRCv9t0dyT37I5bZ6asT6caBhhO3StEDk
NHNhsBHRxboT4Lp3x60P3&f=0&ui=6003062662923id_4e42070adb
bf67d92329417&en=fad_videoplay&a=
Which	is	the	real	one?	
•  h"p://www.example.com.ajax.mul.end.ph	
	
•  h"p://www.example.com/ajax/emu/end.php
Threat	Models	
Emails	from	ecommerce	company	à	Massive	hack			
DNS	spoof	at	individual,	enterprise	or	ISP	level	à	Massive	hack	
Phishing	emails	à	Links	/	ASachments	à	Massive	hack	
1	
2	
3
Hacking	may	be	injurious	
to	your	health
Manipula4ng	Buetooth	enabled	defibrillators		
	
•  deliver	random	shocks	to	a	pajent’s	heart	or		
•  prevent	a	medically	needed	shock	from	occurring.
Remotely	manipula4ng	drug	infusion	pumps	
•  delivering	morphine	drips,	chemotherapy,	anjbiojcs	
•  change	the	dosage
•  Reset	temperature	semngs	on	refrigerators	storing	blood	
&	drugs	and	cause	spoilage.	
•  Altering	digital	medical	records.	
•  Restart	/	reboot	crijcal	equipment.	
•  Spoofed	blood	test	reports.
The	problem	
	
Lack	of	secure	authenjcajon	to	access		
or	manipulate	the	equipment	
	
Weak	passwords	or	default	and		
hardcoded	vendor	passwords	like		
“admin”	or	“1234”.
Hacking	a	car
Hacking	cars	
•  Horn	&	seat	belt	
•  air-condijoning	
•  music	system	/	radio	
•  windshield	wipers		
•  wiper	fluid	blurring	the	glass	
•  accelerator	stops	working,	
•  steering	wheel	
•  disabling	the	brakes	
•  Track	GPS	coordinates
BMW	
Beaujful	Malicious	Women	
Woman	in	the	red	dress	
VIP’s	interview	-	phone	
	
CEOs	interview	-	pendrive	
Harassed	employee	with	iPod	
Bangalore	source	code	ther	
Trojanized	updates	from	US	lady
Russian	Wife	Scam
Ashley	Madison	
Life	is	short.	Have	an	affair.	®	
3	crore	users	
50,000	from	Washington	DC
Hacking		
Ships
•  37%	of	Microsor	servers	on	ships	
vulnerable	to	hacking?	
•  Patch	to	exploit	in	less	than	12	hours
Real	cybera"acks:	
	
•  shut	down	and	/	or	damaged	ports,	ships,	
oil	rigs	and	cargo	handling	systems.		
•  taken	control	of	automated	machinery,	
degraded	/	destroyed	it.	
•  malware	a"ack	on	30,000	Saudi	Aramco	
networked	computers.
Drug	gangs	were	able	to	smuggle	enjre	
container	loads	of	cocaine	through	
Antwerp,	arer	its	hackers	breached	the	
port’s	IT	network.
Indian	Wildlife	Crime	Control	Bureau	to	hire	
cybercrime	specialist	to	catch	online	wildlife	
traffickers	
Specialists	to	handle	‘Web	
patrolling’,	data	analysis	
to	spot	illegal	wildlife	
trade,	create	database	of	
criminals.
Cyber	Crime	
As	A	Service
CCAAS	
Cyber	Crime	As	A	Service	
•  Specific	hacking	sorware	
•  translajon	services	
•  secure	hosjng	
•  DDoS	botnets	
•  lists	of	targets	for	phishing	
schemes	
•  access	to	crijcal	systems	
•  Custom	virus	development		
	
Cheapest:	
batches	of	credit	card	numbers	
	Darkode	was	taken	down	by	police	
from	almost	20	countries.	
	
Sell	–	Buy	–	Hire	-	Outsource
Crore	rupee	apps	–	remote	control	tools	–	bios	malware
Hacking		
Planes	?
1,400	passengers	of	the	Polish	airline	LOT	were	
grounded	at	Warsaw's	Chopin	airport	arer	hackers	
a"acked	the	airline	ground	computer	systems	used	to	
issue	flight	plans.
Ruggedized	and	miniaturized	Tacjcal	Network	Injector	(TNI),		
	
TNI	would	introduce	malicious	traffic	into	insecure	Wi-Fi	networks		
	
Malicious	traffic	injecjon	for	targets	using	open	Wi-Fi	hotspots
Sound
Part	of	child	pornography	invesjgajons	-	"tacjcal	
detecjon	canine"	capable	of	sniffing	out	hidden	
microSD	cards	used	to	store	videos	and	photographs.	
	
Tilly	sniffs	out	bed	bugs,	bodies,	some	types	of	cancer	
and	money.
Pin	protected?	
Switched	off?
1.  Live	Control	Panel	
2.  Stealth	Camera	
3.  Record	Phone	Surroundings	
4.  Phone	Call	Logs	
5.  SMS	Logging	
6.  Phone	Book	Access	
7.  Record	Web	Acjvity	
8.  GPS	Locajon	Tracking	
9.  Instant	Alerts	
10. Applicajon	Blocking	
11. Cell	ID	Tracking	
12. SMS	Commands	
13. Remote	Uninstall
TV	case
The
new age
criminals
Star4ng	up	the	Tor	browser
Searching using hSps://ahmia.fi/search
Email:	info@asianlaws.org	
www.asianlaws.org

More Related Content

More from TechXpla

Strategy 15
Strategy 15Strategy 15
Strategy 15
TechXpla
 
Strategy 14
Strategy 14Strategy 14
Strategy 14
TechXpla
 
Strategy 13
Strategy 13Strategy 13
Strategy 13
TechXpla
 
Strategy 12
Strategy 12Strategy 12
Strategy 12
TechXpla
 
Strategic 11
Strategic 11Strategic 11
Strategic 11
TechXpla
 
Strategy 10
Strategy 10Strategy 10
Strategy 10
TechXpla
 
Strategic 9
Strategic 9Strategic 9
Strategic 9
TechXpla
 
Strategic 8
Strategic 8Strategic 8
Strategic 8
TechXpla
 
Strategic 7
Strategic 7Strategic 7
Strategic 7
TechXpla
 
Strategic 6
Strategic 6Strategic 6
Strategic 6
TechXpla
 
Evaluation 1
Evaluation 1Evaluation 1
Evaluation 1
TechXpla
 
Strategicmanagement5
Strategicmanagement5Strategicmanagement5
Strategicmanagement5
TechXpla
 
Strategicmanagement4
Strategicmanagement4Strategicmanagement4
Strategicmanagement4
TechXpla
 
Strategicmanagement3
Strategicmanagement3Strategicmanagement3
Strategicmanagement3
TechXpla
 
Strategicmanagement2
Strategicmanagement2Strategicmanagement2
Strategicmanagement2
TechXpla
 
Strategicmanagement1
Strategicmanagement1Strategicmanagement1
Strategicmanagement1
TechXpla
 
Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0  Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0
TechXpla
 
Portergeneral
PortergeneralPortergeneral
Portergeneral
TechXpla
 
Crm 16 hours introduction
Crm 16 hours introduction Crm 16 hours introduction
Crm 16 hours introduction
TechXpla
 
International product management
International product managementInternational product management
International product management
TechXpla
 

More from TechXpla (20)

Strategy 15
Strategy 15Strategy 15
Strategy 15
 
Strategy 14
Strategy 14Strategy 14
Strategy 14
 
Strategy 13
Strategy 13Strategy 13
Strategy 13
 
Strategy 12
Strategy 12Strategy 12
Strategy 12
 
Strategic 11
Strategic 11Strategic 11
Strategic 11
 
Strategy 10
Strategy 10Strategy 10
Strategy 10
 
Strategic 9
Strategic 9Strategic 9
Strategic 9
 
Strategic 8
Strategic 8Strategic 8
Strategic 8
 
Strategic 7
Strategic 7Strategic 7
Strategic 7
 
Strategic 6
Strategic 6Strategic 6
Strategic 6
 
Evaluation 1
Evaluation 1Evaluation 1
Evaluation 1
 
Strategicmanagement5
Strategicmanagement5Strategicmanagement5
Strategicmanagement5
 
Strategicmanagement4
Strategicmanagement4Strategicmanagement4
Strategicmanagement4
 
Strategicmanagement3
Strategicmanagement3Strategicmanagement3
Strategicmanagement3
 
Strategicmanagement2
Strategicmanagement2Strategicmanagement2
Strategicmanagement2
 
Strategicmanagement1
Strategicmanagement1Strategicmanagement1
Strategicmanagement1
 
Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0  Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0
 
Portergeneral
PortergeneralPortergeneral
Portergeneral
 
Crm 16 hours introduction
Crm 16 hours introduction Crm 16 hours introduction
Crm 16 hours introduction
 
International product management
International product managementInternational product management
International product management
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 

Hacking the-world-20-jan-2016 by Rohas Nagpal