SlideShare a Scribd company logo
1 of 21
How to do well with Bug
bounties?
-- ABHIJETH D
Agenda
 Introduction
 Finding the right target
 Information gathering
 Approach to discover vulnerabilities
 Using various vulnerability scanners
 POC writing
 Few sample potential RCEs
 Annnd thennnnnnn bug hunting
www.abhijeth.comwww.null.co.in@abhijeth
@nullhyd
Hello
Time to brag:
Security Consultant at TCS for bread and
butter
Love speaking and training
Got lucky with Google, Y!, Microsoft,
Twitter .. Etc
Love anime and politics !!
Trying to contribute to the security
community and start-ups in Hyd.
 Abhijeth Dugginapeddi
 www.abhijeth.com
 @abhijeth
 Fb.com/abhijethd
What is a bug
bounty program
YOU FIND A VULNERABILITY
DO SOME R&D
GET FREE T SHIRTS
FREE SWAG
MOST IMPORTANTLY EARN
SOME BOUNTY
“HALL OF FAME”
”
“Why do companies run such
programs
ARE THEY DUMB TO PAY HACKERS??
Free publicity
Cost efficient
Improve security
Where to get the list !!!
Lets start …!!
 How do we start ?? Which hall of fame do you want to get into ?
Lets test google.com
The road not taken
 Start with easier sites
 Find sites which were not tested by many
 New bug bounty program
leads to better success
 Find the right domain to find a bug.
Finding sub.sub.sub.domain
It is always important to find a sub domain
They say ..!!! BBP is all about XSS
A better approach
 Mixed content
 Click Jacking
 Logical by pass
 Bruteforce
 Directory Listing
 Open redirects
 And When don’t “pay” don’t invest much time!! Remember even a CJ
can give you a HOF
Few Tips
 Next time you get a single vuln in diff domains, make sure you submit
"individual" reports.
 It is always important to find the “right” domain to attack
 A right sub domain can give you a HOF in less than an hour
 Understand the logic before you start your magic
 It is very very very important to write a neat POC.
 Presentation skills do matter!!!
My Dupe Stories….!! 
First Magento
Then Facebook and Yahoo
Even Google
What do you realize??
Special Thanks
Harsha Vardhan
Boppana
For sharing his secrets
Gineesh George
In office, fortunately the only guy
who can “hack”
Lalith and Varun
Kakumani
My partners :D
Thanks a lot
dabhijeth@yahoo.co.in
www.Abhijeth.com
@abhijeth
Facebook.com/abhijeth

More Related Content

What's hot

How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...Frans Rosén
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverEC-Council
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website TrendsSucuri
 
Pubcon Las Vegas 2016 - Penguin 4.0
Pubcon Las Vegas 2016 - Penguin 4.0Pubcon Las Vegas 2016 - Penguin 4.0
Pubcon Las Vegas 2016 - Penguin 4.0paul_macnamara
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsSucuri
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest Haydn Johnson
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book MiniKhairi Aiman
 
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOMENegative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOMEjeffmcjunkin
 
How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)
How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)
How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)Nick Malcolm
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Jason Yee - Chaos! - Codemotion Rome 2019
Jason Yee - Chaos! - Codemotion Rome 2019Jason Yee - Chaos! - Codemotion Rome 2019
Jason Yee - Chaos! - Codemotion Rome 2019Codemotion
 
Progressive Web Apps #TheDevConfSP
Progressive Web Apps #TheDevConfSPProgressive Web Apps #TheDevConfSP
Progressive Web Apps #TheDevConfSPMaria Clara Santana
 
Yet another talk on bug bounty
Yet another talk on bug bountyYet another talk on bug bounty
Yet another talk on bug bountyvinoth kumar
 
Identity in the Future of Embeddables & Wearables
Identity in the Future of Embeddables & WearablesIdentity in the Future of Embeddables & Wearables
Identity in the Future of Embeddables & WearablesJonathan LeBlanc
 

What's hot (18)

How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
 
Empire Work shop
Empire Work shopEmpire Work shop
Empire Work shop
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
 
Pubcon Las Vegas 2016 - Penguin 4.0
Pubcon Las Vegas 2016 - Penguin 4.0Pubcon Las Vegas 2016 - Penguin 4.0
Pubcon Las Vegas 2016 - Penguin 4.0
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
Hack the book Mini
Hack the book MiniHack the book Mini
Hack the book Mini
 
Purple View
Purple ViewPurple View
Purple View
 
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOMENegative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
 
How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)
How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)
How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Jason Yee - Chaos! - Codemotion Rome 2019
Jason Yee - Chaos! - Codemotion Rome 2019Jason Yee - Chaos! - Codemotion Rome 2019
Jason Yee - Chaos! - Codemotion Rome 2019
 
Progressive Web Apps #TheDevConfSP
Progressive Web Apps #TheDevConfSPProgressive Web Apps #TheDevConfSP
Progressive Web Apps #TheDevConfSP
 
Yet another talk on bug bounty
Yet another talk on bug bountyYet another talk on bug bounty
Yet another talk on bug bounty
 
Identity in the Future of Embeddables & Wearables
Identity in the Future of Embeddables & WearablesIdentity in the Future of Embeddables & Wearables
Identity in the Future of Embeddables & Wearables
 
What is hacking
What is hackingWhat is hacking
What is hacking
 

Viewers also liked

Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers JobArbin Godar
 
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & FarmingСергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & FarmingKazHackStan
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Sagar M Parmar
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Shubham Gupta
 

Viewers also liked (7)

Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers Job
 
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & FarmingСергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
 
Bug Bounty for - Beginners
Bug Bounty for - BeginnersBug Bounty for - Beginners
Bug Bounty for - Beginners
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
Bug Bounty Secrets
Bug Bounty Secrets Bug Bounty Secrets
Bug Bounty Secrets
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 

Similar to How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth

15 Practical Startup Growth Hacks - Workshop
15 Practical Startup Growth Hacks - Workshop15 Practical Startup Growth Hacks - Workshop
15 Practical Startup Growth Hacks - WorkshopJon Yongfook
 
You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012jadedsecurity
 
Unlocking WeChat for B2B
Unlocking WeChat for B2BUnlocking WeChat for B2B
Unlocking WeChat for B2BBrandigo
 
2010 continuing ed blogging basics for real estate professionals
2010 continuing ed blogging basics for real estate professionals2010 continuing ed blogging basics for real estate professionals
2010 continuing ed blogging basics for real estate professionalsLola Audu
 
Adam Proehl - SEMPO Atlanta. October 1, 2010 Topic: Social Media - including ...
Adam Proehl - SEMPO Atlanta. October 1, 2010 Topic: Social Media - including ...Adam Proehl - SEMPO Atlanta. October 1, 2010 Topic: Social Media - including ...
Adam Proehl - SEMPO Atlanta. October 1, 2010 Topic: Social Media - including ...Allison Fabella
 
The Open Manifesto: how to work smarter, supercharge collaboration and (maybe...
The Open Manifesto: how to work smarter, supercharge collaboration and (maybe...The Open Manifesto: how to work smarter, supercharge collaboration and (maybe...
The Open Manifesto: how to work smarter, supercharge collaboration and (maybe...CanadaHelps / MyCharityConnects
 
IMPACT-Social Media and Your Business
IMPACT-Social Media and Your BusinessIMPACT-Social Media and Your Business
IMPACT-Social Media and Your BusinessCollin Condray
 
Facebook Analytics - HeroConf 2018
Facebook Analytics - HeroConf 2018Facebook Analytics - HeroConf 2018
Facebook Analytics - HeroConf 2018Susan Wenograd
 
Why Content Marketing Fails - Rand Fishkin
Why Content Marketing Fails - Rand FishkinWhy Content Marketing Fails - Rand Fishkin
Why Content Marketing Fails - Rand FishkinMarketo
 
Social Media for Micro Enterprise
Social Media for Micro EnterpriseSocial Media for Micro Enterprise
Social Media for Micro EnterpriseCalvin Jones
 
Projects Colman2010 Part2
Projects Colman2010 Part2Projects Colman2010 Part2
Projects Colman2010 Part2Shai Wolkomir
 
How to Build a Chatbot with Tom Martin, Founder of LawDroid
How to Build a Chatbot with Tom Martin, Founder of LawDroidHow to Build a Chatbot with Tom Martin, Founder of LawDroid
How to Build a Chatbot with Tom Martin, Founder of LawDroidThomas G. Martin
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing FailsRand Fishkin
 
How to Use Content Marketing to Better Reach Your Ideal Audience
How to Use Content Marketing to Better Reach Your Ideal AudienceHow to Use Content Marketing to Better Reach Your Ideal Audience
How to Use Content Marketing to Better Reach Your Ideal AudienceBrian Rotsztein
 
Chatbots New York City and Global Meetup #001 - Talkabot Highlights
Chatbots New York City and Global Meetup #001 - Talkabot HighlightsChatbots New York City and Global Meetup #001 - Talkabot Highlights
Chatbots New York City and Global Meetup #001 - Talkabot HighlightsAlec Lazarescu
 
How to contribute back to Open Source
How to contribute back to Open SourceHow to contribute back to Open Source
How to contribute back to Open SourceWojciech Koszek
 
Driving Social Traffic
Driving Social TrafficDriving Social Traffic
Driving Social TrafficKate Buck Jr
 

Similar to How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth (20)

Evangelizing Explained
Evangelizing ExplainedEvangelizing Explained
Evangelizing Explained
 
RoboChat Review.pdf
RoboChat Review.pdfRoboChat Review.pdf
RoboChat Review.pdf
 
15 Practical Startup Growth Hacks - Workshop
15 Practical Startup Growth Hacks - Workshop15 Practical Startup Growth Hacks - Workshop
15 Practical Startup Growth Hacks - Workshop
 
You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012
 
Unlocking WeChat for B2B
Unlocking WeChat for B2BUnlocking WeChat for B2B
Unlocking WeChat for B2B
 
2010 continuing ed blogging basics for real estate professionals
2010 continuing ed blogging basics for real estate professionals2010 continuing ed blogging basics for real estate professionals
2010 continuing ed blogging basics for real estate professionals
 
Adam Proehl - SEMPO Atlanta. October 1, 2010 Topic: Social Media - including ...
Adam Proehl - SEMPO Atlanta. October 1, 2010 Topic: Social Media - including ...Adam Proehl - SEMPO Atlanta. October 1, 2010 Topic: Social Media - including ...
Adam Proehl - SEMPO Atlanta. October 1, 2010 Topic: Social Media - including ...
 
The Open Manifesto: how to work smarter, supercharge collaboration and (maybe...
The Open Manifesto: how to work smarter, supercharge collaboration and (maybe...The Open Manifesto: how to work smarter, supercharge collaboration and (maybe...
The Open Manifesto: how to work smarter, supercharge collaboration and (maybe...
 
IMPACT-Social Media and Your Business
IMPACT-Social Media and Your BusinessIMPACT-Social Media and Your Business
IMPACT-Social Media and Your Business
 
Facebook Analytics - HeroConf 2018
Facebook Analytics - HeroConf 2018Facebook Analytics - HeroConf 2018
Facebook Analytics - HeroConf 2018
 
MnSearch Summit - Keynote - Rand Fishkin - Why Content Marketing Fails
MnSearch Summit - Keynote - Rand Fishkin - Why Content Marketing FailsMnSearch Summit - Keynote - Rand Fishkin - Why Content Marketing Fails
MnSearch Summit - Keynote - Rand Fishkin - Why Content Marketing Fails
 
Why Content Marketing Fails - Rand Fishkin
Why Content Marketing Fails - Rand FishkinWhy Content Marketing Fails - Rand Fishkin
Why Content Marketing Fails - Rand Fishkin
 
Social Media for Micro Enterprise
Social Media for Micro EnterpriseSocial Media for Micro Enterprise
Social Media for Micro Enterprise
 
Projects Colman2010 Part2
Projects Colman2010 Part2Projects Colman2010 Part2
Projects Colman2010 Part2
 
How to Build a Chatbot with Tom Martin, Founder of LawDroid
How to Build a Chatbot with Tom Martin, Founder of LawDroidHow to Build a Chatbot with Tom Martin, Founder of LawDroid
How to Build a Chatbot with Tom Martin, Founder of LawDroid
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
 
How to Use Content Marketing to Better Reach Your Ideal Audience
How to Use Content Marketing to Better Reach Your Ideal AudienceHow to Use Content Marketing to Better Reach Your Ideal Audience
How to Use Content Marketing to Better Reach Your Ideal Audience
 
Chatbots New York City and Global Meetup #001 - Talkabot Highlights
Chatbots New York City and Global Meetup #001 - Talkabot HighlightsChatbots New York City and Global Meetup #001 - Talkabot Highlights
Chatbots New York City and Global Meetup #001 - Talkabot Highlights
 
How to contribute back to Open Source
How to contribute back to Open SourceHow to contribute back to Open Source
How to contribute back to Open Source
 
Driving Social Traffic
Driving Social TrafficDriving Social Traffic
Driving Social Traffic
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth