SlideShare a Scribd company logo
Red Team Diary:
Meu Recon falhou e agora?
Arthur Paixão
Red Team Leader | C6 Bank
#whoami
Arthur Paixão
Red Team Leader at C6 Bank
“Made in Recife, Lost in São Paulo”
#agenda Engenharia Social
Red Team
Nem tudo são flores
Pensando Fora da Caixa
Meu sucesso é sua derrota
Conclusão 
#entry.point();
Engenharia Social
• A engenharia social, no contexto de segurança da
informação, refere-se à manipulação psicológica de
pessoas para a execução de ações ou divulgar
informações confidenciais.
• Este é um termo que descreve um tipo psicotécnico
de intrusão que depende fortemente de interação
humana e envolve enganar outras pessoas para
quebrar procedimentos de segurança.
Como não fazer engenharia social...
#SE.start();
Você está fazendo
isto errado...
#SE.start();
Você está fazendo
isto errado...
Red team, o que comem?
Onde vivem?
#entry.point();
Red Team
#SE.start();
Nem tudo são
flores...
https://youtu.be/pL9q2lOZ1Fw
VIDEO:
“Watch hackers break into the US power
grid”
#re.Start();
• Rule 1: Always have an escape plan
• Rule 2: Never get caught.
• Rule 3: Be aware of your surroundings.
• Rule 4: Always have a backup plan.
• Rule 5: Assumpton is the mother of all fuckups.
• Rule 6: Trust your gut.
• Rule 7: Simple and light equals freedom, agility and mobility.
• Rule 8: KISS: Keep it simple, stupid.
• Rule 9: The soluton is in the problem.
• Rule 10: Don't become predictable.
• Rule 11: Never take the elevator.
• Rule 12: Act, don’t react.
The Rules
https://redteams.net/rules
#re.Start();
• Rule 1: Always have an escape plan
• Rule 2: Never get caught.
• Rule 3: Be aware of your surroundings.
• Rule 4: Always have a backup plan.
• Rule 5: Assumpton is the mother of all fuckups.
• Rule 6: Trust your gut.
• Rule 7: Simple and light equals freedom, agility and mobility.
• Rule 8: KISS: Keep it simple, stupid.
• Rule 9: The soluton is in the problem.
• Rule 10: Don't become predictable.
• Rule 11: Never take the elevator.
• Rule 12: Act, don’t react.
The Rules
https://redteams.net/rules
#re.Start();
• Rule 1.1: Always have a plan.
• Rule 1.2: Always have a back-up plan, because
the frst one probably won’t work.
• Rule 1.3: Always have an escape plan because
all the rest of the plans will fail.
The Rules
EXTENSION
https://redteams.net/rules
#re.Start();
• Rule 1.1: Always have a plan.
• Rule 1.2: Always have a back-up plan, because
the frst one probably won’t work.
• Rule 1.3: Always have an escape plan because
all the rest of the plans will fail.
The Rules
EXTENSION
https://redteams.net/rules
Vamos calibrar nosso payload
#get.Scenario()
Registra um dominoRegistra um domino
Envia um email para o
alvo dando by-pass no
SPF
Envia um email para o
alvo dando by-pass no
SPF
Spear Phishing Roubo de Credencial
#re.Start();
 Arquivo de documento do Word com autentcação
básica.
 Ataque de manipulação de link. (sendRedirect)
 Planilha no excel. (VBS)
 UNC path injected doc + netNTLM hash
Roubo de
Credencial
https://redteams.net/rules
Arquivo DOC com basic
Authentcaton
#re.Start();
DOC Word com basic
authentcaton
#re.Start();
DOC Word com basic
authentcaton
TELA DA VITIMATELA DA VITIMA
#re.Start();
DOC Word com basic
authentcaton
Manipulaçao de links.
#re.Start();
Manipulação de
Links
#re.Start();
Manipulação de
Links
TELA DA VITIMATELA DA VITIMA
#re.Start();
Manipulação de
Links
TELA DA VITIMATELA DA VITIMA
#re.Start();
Manipulação de
Links
Planilhas do Excel
#re.Start();
TELA DA VITIMATELA DA VITIMA
#re.Start();
O que seria um ataque diferenciado
com o mesmo equipamento?
#base.hardware
https://www.hak5.org/gear/usb-rubber-ducky
#atck.000x1
+
https://www.clasohlson.com/uk/Clas-Ohlson-3350-mAh-Power-bank/Pr387694000
#atck.000x2
+
https://www.americanas.com.br/produto/123403301
#atck.000x2
+
https://bit.ly/2AWcNx4
#atck.000x2
+
https://bit.ly/2AYstjx
#atck.000x2
+
https://bit.ly/2D8E0hL
Pimp my atack!
#atck.000x2
+
CENSURADO
CENSURADO
#references • Phishing Payloads:
htps://github.com/bhdresh/SocialEngineeringPayloads
• CVE-2017-0199:
htps://github.com/bhdresh/CVE-2017-0199
CVE-2017-8759:
htps://github.com/bhdresh/CVE-2017-8759
• CVE-2017-11882
• htps://redteams.net/redteaming/2013/social-engineering
• htps://www.redteamsecure.com/social-engineering/
DUVIDAS?
PERGUNTAS?

More Related Content

Similar to Red Team Diary: Meu Recon falhou e agora?

Halt and Don't Catch Fire - SREcon18 Europe
Halt and Don't Catch Fire - SREcon18 EuropeHalt and Don't Catch Fire - SREcon18 Europe
Halt and Don't Catch Fire - SREcon18 Europe
effie mouzeli
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Vlad Styran
 
100 NASA Project Managment Rules
100 NASA Project Managment Rules100 NASA Project Managment Rules
100 NASA Project Managment Rulessimu_mihai
 
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Steve Werby
 
Star Wars, SEO Mistakes, And Why Nothing Is Ever Your Fault
Star Wars, SEO Mistakes, And Why Nothing Is Ever Your FaultStar Wars, SEO Mistakes, And Why Nothing Is Ever Your Fault
Star Wars, SEO Mistakes, And Why Nothing Is Ever Your Fault
Wayne Barker
 
How To Make Your Plans Suck Less — Maarten Dalmijn at the 57th Hands-on Agile...
How To Make Your Plans Suck Less — Maarten Dalmijn at the 57th Hands-on Agile...How To Make Your Plans Suck Less — Maarten Dalmijn at the 57th Hands-on Agile...
How To Make Your Plans Suck Less — Maarten Dalmijn at the 57th Hands-on Agile...
Stefan Wolpers
 
The Invisible Traceback
The Invisible TracebackThe Invisible Traceback
The Invisible Traceback
Mel Chua
 
Business Of Open Source
Business Of Open SourceBusiness Of Open Source
Business Of Open Source
Liza Kindred
 
Big Ideias about Spotify Culture
Big Ideias about Spotify CultureBig Ideias about Spotify Culture
Big Ideias about Spotify Culture
André Faria Gomes
 
Hackers contemplations
Hackers contemplationsHackers contemplations
Hackers contemplations
Chris Roberts
 
Understanding randomness
Understanding randomnessUnderstanding randomness
Understanding randomnesssuncil0071
 
Influx/Days 2017 San Francisco | Baron Schwartz
Influx/Days 2017 San Francisco | Baron SchwartzInflux/Days 2017 San Francisco | Baron Schwartz
Influx/Days 2017 San Francisco | Baron Schwartz
InfluxData
 
Designing with capabilities (DDD-EU 2017)
Designing with capabilities (DDD-EU 2017)Designing with capabilities (DDD-EU 2017)
Designing with capabilities (DDD-EU 2017)
Scott Wlaschin
 
Larry Maccherone: "Probabilistic Decision Making"
Larry Maccherone: "Probabilistic Decision Making"Larry Maccherone: "Probabilistic Decision Making"
Larry Maccherone: "Probabilistic Decision Making"
RedHatAgileDay
 
How Many People Do You Really Know
How Many People Do You Really KnowHow Many People Do You Really Know
How Many People Do You Really Know
Lynnme1205
 

Similar to Red Team Diary: Meu Recon falhou e agora? (15)

Halt and Don't Catch Fire - SREcon18 Europe
Halt and Don't Catch Fire - SREcon18 EuropeHalt and Don't Catch Fire - SREcon18 Europe
Halt and Don't Catch Fire - SREcon18 Europe
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
 
100 NASA Project Managment Rules
100 NASA Project Managment Rules100 NASA Project Managment Rules
100 NASA Project Managment Rules
 
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Star Wars, SEO Mistakes, And Why Nothing Is Ever Your Fault
Star Wars, SEO Mistakes, And Why Nothing Is Ever Your FaultStar Wars, SEO Mistakes, And Why Nothing Is Ever Your Fault
Star Wars, SEO Mistakes, And Why Nothing Is Ever Your Fault
 
How To Make Your Plans Suck Less — Maarten Dalmijn at the 57th Hands-on Agile...
How To Make Your Plans Suck Less — Maarten Dalmijn at the 57th Hands-on Agile...How To Make Your Plans Suck Less — Maarten Dalmijn at the 57th Hands-on Agile...
How To Make Your Plans Suck Less — Maarten Dalmijn at the 57th Hands-on Agile...
 
The Invisible Traceback
The Invisible TracebackThe Invisible Traceback
The Invisible Traceback
 
Business Of Open Source
Business Of Open SourceBusiness Of Open Source
Business Of Open Source
 
Big Ideias about Spotify Culture
Big Ideias about Spotify CultureBig Ideias about Spotify Culture
Big Ideias about Spotify Culture
 
Hackers contemplations
Hackers contemplationsHackers contemplations
Hackers contemplations
 
Understanding randomness
Understanding randomnessUnderstanding randomness
Understanding randomness
 
Influx/Days 2017 San Francisco | Baron Schwartz
Influx/Days 2017 San Francisco | Baron SchwartzInflux/Days 2017 San Francisco | Baron Schwartz
Influx/Days 2017 San Francisco | Baron Schwartz
 
Designing with capabilities (DDD-EU 2017)
Designing with capabilities (DDD-EU 2017)Designing with capabilities (DDD-EU 2017)
Designing with capabilities (DDD-EU 2017)
 
Larry Maccherone: "Probabilistic Decision Making"
Larry Maccherone: "Probabilistic Decision Making"Larry Maccherone: "Probabilistic Decision Making"
Larry Maccherone: "Probabilistic Decision Making"
 
How Many People Do You Really Know
How Many People Do You Really KnowHow Many People Do You Really Know
How Many People Do You Really Know
 

More from Arthur Paixão

From P0W3R to SH3LL
From P0W3R to SH3LLFrom P0W3R to SH3LL
From P0W3R to SH3LL
Arthur Paixão
 
Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?
Arthur Paixão
 
Como se tornar JEDI em desafios de Capture the Flag
Como se tornar JEDI em desafios de Capture the FlagComo se tornar JEDI em desafios de Capture the Flag
Como se tornar JEDI em desafios de Capture the Flag
Arthur Paixão
 
Modern Healthcare Hacking
Modern Healthcare HackingModern Healthcare Hacking
Modern Healthcare Hacking
Arthur Paixão
 
[IN]Segurança em Hospitais
[IN]Segurança em Hospitais[IN]Segurança em Hospitais
[IN]Segurança em Hospitais
Arthur Paixão
 
Investigando email
Investigando emailInvestigando email
Investigando email
Arthur Paixão
 
Monitoramento de malware em Windows NT 6.x - 64bits
Monitoramento de malware em Windows NT 6.x - 64bitsMonitoramento de malware em Windows NT 6.x - 64bits
Monitoramento de malware em Windows NT 6.x - 64bits
Arthur Paixão
 

More from Arthur Paixão (7)

From P0W3R to SH3LL
From P0W3R to SH3LLFrom P0W3R to SH3LL
From P0W3R to SH3LL
 
Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?
 
Como se tornar JEDI em desafios de Capture the Flag
Como se tornar JEDI em desafios de Capture the FlagComo se tornar JEDI em desafios de Capture the Flag
Como se tornar JEDI em desafios de Capture the Flag
 
Modern Healthcare Hacking
Modern Healthcare HackingModern Healthcare Hacking
Modern Healthcare Hacking
 
[IN]Segurança em Hospitais
[IN]Segurança em Hospitais[IN]Segurança em Hospitais
[IN]Segurança em Hospitais
 
Investigando email
Investigando emailInvestigando email
Investigando email
 
Monitoramento de malware em Windows NT 6.x - 64bits
Monitoramento de malware em Windows NT 6.x - 64bitsMonitoramento de malware em Windows NT 6.x - 64bits
Monitoramento de malware em Windows NT 6.x - 64bits
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Red Team Diary: Meu Recon falhou e agora?