SlideShare a Scribd company logo
1 of 39
Download to read offline
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
Picture	Source	-	h-p://resources.infosecins5tute.com	 ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	
2017
Understanding	The	XSS	Vulnerability	-	Analysis	To	Exploita;on	
	
Something	About	Speaker	(Of-Course	Me)	J		
Narendra	Bha;	–	OSCP,	CEH	
Senior	Security	Analyst	
Suma	SoK	Pvt.	Ltd.	–	Pune	
			Email	-		narendra.bha5@websecgeeks.com	
				Blog		-	h-p://websecgeeks.com	
	Picture	Source	-	h-p://peachesandcake.com/about-me	 ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	
2017
Something	About	Me	
Narendra	Bha;	–	OSCP,	CEH	
Senior	Security	Analyst	
Suma	SoK	Pvt.	Ltd.	–	Pune	
			Email	-		narendra.bha5@websecgeeks.com	
				Blog		-	h-p://websecgeeks.com	
	
•  Having	Four	Years	of	Experience	and	have	been	working	in	Suma	SoP	Pvt.	Ltd.	as	Senior	Security	Analyst	
	
•  Spoke	at	OWASP	Pune	Chapter	18th	Feb	2016	on	Advance	Web	Applica5on	A-acks	"Dive	into	the	Profound	Web	a-acks".	
	
•  Found	various	cri5cal	vulnerabili5es	on	Portals	like	Google,	Facebook,	Apple,	LinkedIn,	MicrosoP,	Yahoo	and	more	
	
•  Holds	more	then	12	CVE	&	3	Zero	days	vulnerabili5es	
	
•  Maintaining	my	own	blog	where	I	put	my	exploits	and	research-		h-p://websecgeeks.com	
	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	
2017	
																																			What	Is	XSS	(Cross	Site	Scrip5ng)	
	
According	to	OWASP	
XSS	(Cross	Site	Scrip5ng)	a-acks	are	a	type	of	injec5on,	in	which	malicious	
scripts	are	injected	into	otherwise	benign	and	trusted	web	sites	
	
In	simple	words,	Execu;ng	our	own	JavaScript	into	the	browser		
	
																																											What	Is	JavaScript	
	
It’s	a	client	side	scrip5ng	which	is	mostly	used	to	control	Client	Side	objects	
Ex.	Restrict	the	user	to	enter	only	email	in	email	text	box	by	applying	a	
JavaScript	code.	
	 												Impact	Of	XSS	
	
•  An	a-acker	can	control/modify	the	Web	Page	content.	
•  Hijacking	the	user	SESSION	ID	
•  Redirect	Users	other	malicious	website.
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Why	Talk	About	XSS	(Cross	Site	Scrip5ng)	?	
Source	-	h-ps://www.brigh-alk.com/webcast/288/97255	
According	To	OSVDB	Vulnerabili5es	Graph
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
For	Fun	&	Profit	–	Bug	Bounty	J
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
For	Fun	&	Profit	–	Bug	Bounty	Hunters	
Slack	Stored	XSS	Bounty	Of		$1000	;)
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
For	Fun	&	Profit	–	Bug	Bounty	Hunters	
Slack	Stored	XSS	Bounty	Of	$1000	;)	in	2016		
Source	-	h-ps://hackerone.com/reports/159460
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
For	Fun	&	Profit	–	Bug	Bounty	Hunters	
Heroku	Reflected	XSS	Bounty	Of		$500	;)	-	
2014
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
For	Fun	&	Profit	–	Bug	Bounty	Hunters	
XSS	In	Apple	Online	Store	-	2013
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
For	Fun	&	Profit	–	Bug	Bounty	Hunters	
Don’t	Tell	This	To	Any	One	_/_	,	I	Never	Paid	Income	Tax	For	My	$$$$$	
Boun5es	;)
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Talk	About	The	XSS		
Several	people	are	not	aware	about	the	Basic	Approach	to	find	the	XSS.	What	they	basically	do	is	to	copy	paste	the	payloads		
In	to	the	applica5on	and	hope	for	the	XSS	to	trigger.	
	
Picture	Source	-	h-p://www.pak101.com/funnypictures/
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Talk	About	The	XSS		
We	will	follow	a	simple	approach	to	Find	The	XSS	Vulnerability		
1.Analysis	 2.Detec5on	 3.Exploit	
	
Reflec5on	 Filtra5on	 Trigger	XSS
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Reflec;on	–	No	Reflec;on	No	XSS	
1.Analysis	
Reflec5on	
1.	User	send	some	data	
to	website/applica5on	
3.Server	respond	with	same	value	
sent	by	user.
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Reflec;on	–	No	Reflec;on	No	XSS	
1.Analysis	
Reflec5on	
The	user	input	should	be	reflected	back	into	client	side	code,	if	there	is	no	reflec5on	of	the	user	input	that	means	XSS	
Is	not	possible.
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Reflec;on	
1.Analysis	
Reflec5on	
Demo
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Reflec;on	
1.Analysis	
Reflec5on	
Important	Rule	Of	XSS	
“No	Reflec5on	No	XSS	L	“
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Context	In	Reflec;on	
1.Analysis	
Context	In	Reflec5on	
What	Is	Context?		
Contexts	are	the	loca5ons	where	user	input	is	placed.	
There	are	different	types	of	contexts,	lets	discuss	them	in	detail.	
1.  HTML	Context	
2.  A-ribute	Context	
3.  Script	Context	
4.  URL	Context	
5.  Other	contexts(We	will	discuss	later)
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Context	In	Reflec;on	
1.Analysis	
Context	In	Reflec5on	
1.	HTML	Context		
h-p://www.websecgeeks.com/search?q=xyzxyz	
When	user	input	is	reflect	back	into	the	html	tags
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Context	In	Reflec;on	
1.Analysis	
Context	In	Reflec5on	
2.	A-ribute	Context		
When	user	input	is	reflected	back	into	the	some	input	tag	“value”		
view-source:h-ps://www.bhaskar.com/search/?q=xyz
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Context	In	Reflec;on	
1.Analysis	
Context	In	Reflec5on	
3.	Script	Context		
view-source:h-p://aajtak.intoday.in/topic/xss.html	
When	user	input	is	reflected	back	into	the	script	tag
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Context	In	Reflec;on	
1.Analysis	
Context	In	Reflec5on	
4.	URL	Context		
																																						Web2Py	Web	Framework	
h-p://127.0.0.1:8000/admin/default/install_plugin/asdad?plugin=plugin-clientapi&source=sumasoP.com	
When	user	input	is	reflected	back	into	HREF	tag
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Context	In	Reflec;on	
So	we	have	seen	4	Context	Where	our	user	input	get	reflected	
1.	HTML	Context		 2.	A-ribute	Context		
3.	Script	Context		
4.	URL	Context
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Filtra;on	
2.Detec5on	
Filtra5on	
We	need	to	check	whether	our	given	value	is	geVng	filtered/sani;zed	by	the	applica;on	or	not	!	
Filter/Sani5ze	=	If	we	send	the	value	ex.	“<hello>”	then	applica5on	remove	the	special	character	or	change	special		
Value	to	html	encoding	
As	Below	
	
<hello>	=	hello	
<hello>	=	&gthello&lt	 Demo	–	a-ributecontextsecure.php
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Trigger	The	XSS	
1.Analysis	 2.Detec5on	 3.Exploit	
	
Reflec5on	 Filtra5on	 Trigger	XSS	
3	Steps	To	Find	XSS	–	Lets	Apply	Those	Steps	To	Find	XSS
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Understand	The	Context	In	Reflec;on	
To	trigger	the	XSS	we	can	use	pre-define	Payload(Javascript)	
3.Exploit
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Trigger	The	XSS	
1.	HTML	Context		
<script>alert(1)</script>	
	
</html></script><script>alert(1)</script>		
(Close	the	tag	where	input	placed)	
Demo	
3.Exploit	
	
JavaScript	Payload
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Trigger	The	XSS	
2.	A]ribute	Context		
“></script><script>alert(1)</script>	(For	double	quote)	
	
‘></script><script>alert(1)</script>	(For	single	quote)	
	
“onmouseover=“alert(1)”	–	Typical	Example	
Demo	
3.Exploit	
	
JavaScript	Payload
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Trigger	The	XSS	
3.	Script	Context		
“;confirm(1);”	(For	double	quote)	
	
‘;confirm(1);’	(For	single	quote)	
	
</script><script>alert(1)</script>	(Close	the	tag	where	input	
placed)	
	
“;</script><script>alert(1)</script>	(For	Double	Quotes,	Close	
the	tag	where	input	placed)	
	
‘;</script><script>alert(1)</script>	(For	Single	Quotes,Close	the	
tag	where	input	placed)	
	
	
Demo	
3.Exploit	
	
JavaScript	Payload
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Trigger	The	XSS	
3.Exploit	
	
																																					Short	Case	Study	Of	XSS	In	Wordfence	Firewall	Plugin	For	Wordpress	
	
Wordfence	provide	premium	services	for	Wordpress	CMS	to	Prevent,	Defence	web	a-acks	&	having	700-3000	download	per	day
Permission	granted	by	Vendor	To	Present	Wordfence	XSS	In	ISACA	Chapter
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Trigger	The	XSS	
4.	URL	Context		
javascript:alert(1)	
	
data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4=	
Demo	
3.Exploit	
	
JavaScript	Payload
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Lets	Trigger	The	XSS	 3.Exploit	
	
																					Short	Case	Study	Of	XSS	In	Web2py		Python	Based	Web	Framework	–	Very	Secure	Framework	Actually	J	
Picture	Source	-	h-p://www.pyguy.com/wp-content/uploads/2016/01/show-tasks.png	Permission	granted	by	Vendor	To	Present	Web2py	XSS	In	ISACA	Chapter
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Types	Of	XSS	
1-	Reflected	XSS		
	
This	type	of	XSS	is	temporary,	need	to	send	URL	to	vic5m.	
	
	
2.	Stored	XSS	
	
Web	applica5on	stored	the	user	input,	which	can	get	trigger	the	XSS	all	the	5me	user	visit	visit	that	page.	
	
	
3.	DOM	Based	XSS	
	
Vulnerable	Javascript/HTML	code	which	takes	the	user	input	unsafely	cause	the	DOM	Based	XSS	
3.Exploit
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Impact	Of	The	XSS	
•  Phishing	A-acks	
•  Redirect	User	To	Malicious	Website	
•  Session	Hijacking	
•  DDOS	A-ack	
•  Rest	Depends	On	A-acker	Methodology.
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
How	To	Prevent	XSS	–	It	is	as	simple	as	that	J		Just	Sani;ze	The	User	Input	For	Special	Characters
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Some	Mistakes	Which	Pentester/Security	Guys	OKen	Do	While	Finding	XSS	Vulnerability	
	
Do	not	forget	to	check	the	reflec;on	on	mul;ple	places.	
	
May	be	it	is	possible	that	one	of	the	reflec;on	point	is	un-secured.	
Mul5ple	Reflec5on
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
Download	the	source	code	for	the	Hands-On	
Download	– www.iamvulnerable.online/xssdemo/xssdemo.zip
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
End	Of	Presenta;on
Understanding	the	XSS	Vulnerability	-	Analysis	To	Exploita;on	
ISACA	Pune	Chapter	Monthly	Lecture	Mee5ng	June	2017	
																																																																			Any	Ques;ons	?	
	
	
	
Please	share	your	feedback	of	this	presenta;on	on	narendra.bha5@websecgeeks.com	
	
Thanks	For	Your	Time	!	
Narendra	Bha;	–	OSCP,	CEH

More Related Content

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

ISACA Pune Chapter June 17th 2017 - Narendra Bhati