SlideShare a Scribd company logo
1 of 84
- Action against cyber crime
Presented by:-
Nilesh Sapariya
Security Researcher | CEH v8 | Blogger
This talk is NOT about #Hacking
This talk is about
How to kick start your career in to Information Security
How to protect organizations from cyber criminals
Understanding Difference between:-
Ever green - OWASP Top 10 Attack Methodology
Before We Start :- Disclaimer
 My posts have nothing to do with my company of organization I’m working. Its
strictly educational purpose only.
 All the knowledge provided on this slides area unit for academic functions solely.
The positioning is not any approach to blame for any misuse of the knowledge.
 This slides is completely meant for providing data on “Computer Security”,
“Computer Programming” and different connected topics and is not any
approach connected towards the terms “CRACKING” or “HACKING” (Unethical).
 The word “Hack” or “Hacking” that's used on this slides shall be considered
“Ethical Hack” or “Ethical Hacking” severally.
 We tend to believe solely in White Hat Hacking. On the opposite hand we tend to
condemn Black Hat Hacking.
Who Am I ?
 A researcher in Web Application Security
 A Bug Hunter Enthusiast
 3+ years of Experience in Information Security
 Listed in top sites hall of fame
 Speaker @Null Mumbai Chapter
 Blogging at http://shield4you.blogspot.in/
 A Twitter lover @nilesh_loganx
etc...
HOF + $$$ - Coming soon
Agenda
 The Importance of Cyber Security
 Different domains in Cyber Security
 Black Hat vs. White Hat vs. Grey Hat
 OWASP Top 10 Attack Methodology
 Deep Dive into XSS,CSRF and IDOR
 Practical Session on various attacks
Why Security In Demand ?
#Reason1 : Apple
https://zerodium.com/ios9.html
#Reason2 : Facebook
http://www.tripwire.com/state-of-security/latest-security-
news/facebook-awards-security-researches-100000/#.VcyB2X6GD-
U.twitter
#Reason3: Microsoft
http://blog.hackersonlineclub.com/2015/08/microsoft-
announced-to-increase-bug.html
#Reason4 : Ashley Madison
http://thehackernews.com/2015/08/ashley-madison-
hack_24.html
#Reason5 :
 http://www.computerworld.com/article/2496599/malware-
vulnerabilities/google-pays-record--31k-bounty-for-chrome-bugs.html
Why they pay this much for security ?
 http://thehackernews.com/2015/09/ashley-madison-password-cracked.html
 http://thehackernews.com/2015/09/hacking-satellite.html
 http://thehackernews.com/2015/07/united-airlines-hacked.html
Many more……
Primary Domains in Information Security
1. Web Application Security / Mobile Application security
2. Network Security
3. Digital forensics
4. Secure Code review
5. Compliance :- ISO/COBIT implementation
6. Fuzzing / Exploitation
Must for Info Sec guy:-
https://twitter.com/nilesh_loganx
Follow me + my followers ;)
http://null.co.in/
Subscribe to null mailing list + attend
free trainings
Take Away :-
Black Hat Hackers
White Hat Hackers
Grey Hat Hackers
OWASP Top 10 – Stick to the basic
 https://www.owasp.org/index.php/Top_10_2013-Top_10
Deep dive into different attacks
XSS
CSRF
IDOR
Why XSS, CSRF and IDOR ?
Easy to find
High impact
Account takeover
Misunderstood by many
Why XSS ?
#Reason 1
#Reason 2 : $$$
Highest paid XSS Reward
 http://www.paulosyibelo.com/2014/07/the-unseen-facebook-bug-
bounty-2014-x.html
Why you should care about XSS ?
 So XSS is involved in two recent big HACKS i.e. Apple Developer +
Ubuntu Forums
 Story on :- How I Secured Dating Site- Stored XSS
 http://mytechblog.com/other/apple/apple-developer-website-hacked-what-happened/
 http://blog.canonical.com/2013/07/30/ubuntu-forums-are-back-up-and-a-post-mortem/
A Story Of How I Landed On Dating Site and
Secured it- Stored XSS
 http://shield4you.blogspot.in/2015/08/a-story-of-how-i-landed-on-dating-site.html
What is XSS ?
According to OWASP:-
 Cross-Site Scripting (XSS) attacks are a type of injection, in which
malicious scripts are injected into otherwise benign and trusted web
sites
 https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
#3rd Position @OWASP
https://twitter.com/brutelogic/status/640141613134692352
 Credit : Brute Logic
Types of XSS
1. Stored XSS (Persistent)
2. Reflected XSS (Non-Persistent)
3. DOM XSS
4. TRACE XSS
5. Self XSS
1. Stored XSS
2. Reflected XSS
3. DOM based XSS
 Basically all HTML documents have an associated DOM, consisting of
objects representing the document properties from the point of view
of the browse
 Whenever a script is executed client-side, the browser provides the
code with the DOM of the HTML page where the script runs, thus,
offering access to various properties of the page and their values,
populated by the browser from its perspective.
 The script code never gets to the server
E.g. Marktplaats- Bug Bounty – DOM based XSS - Fixed
Self XSS – Microsoft – NA
How they fixed it?
Demo:
bWAPP – Windows / VM machine
Burp suite-pro
Download link:-
http://sourceforge.net/projects/bwapp/
Set up:-
Attacker - Windows 8 Victim - Kali Linux
Internet
Consider this as public forum which is vulnerable to XSS
XSS Bug – Video
What is CSRF ?
 Wiki Says :-
http://en.wikipedia.org/wiki/Cross-site_request_forgery
Description
“Cross-site Request Forgery is a vulnerability in a
website that allows attackers to force victims to
perform security-sensitive actions on that site
without their knowledge.”
#8th Position @OWASP
Why CSRF so important ?
Highest paid bounty for CSRF: 10,000$
 http://yasserali.com/hacking-paypal-accounts-with-one-click/
Latest | News
 Pay pal Defaced by CSRF
Latest | News
 Facebook Hacked #CSRF
Link: http://pyx.io/blog/facebook-csrf-leading-to-full-account-takeover
Latest | News Blogger hacked # CSRF
 Blogger hacked # CSRF
Latest | News
 Blackberry CSRF leading to takeover user profile information
 http://shield4you.blogspot.in/2015/08/how-i-hacked-blackberrycom-to-update.html
 https://twitter.com/nilesh_loganx/status/630357485262663681
How this works ?
Anatomy of CSRF Attack
 Step 1: Attacker hosts web pages with pre-populated HTML form data.
 Step 2: Victim browses to attacker’s HTML form.
 Step 3: Page automatically submits pre-populated form data to a site
where victim has access (No verification done by server as browser is
performing request by checking cookies)
 Step 4: Site Authenticates request (with attacker’s form data) as coming
from victim
Result : Attacker’s form data is accepted by server since it was sent from
legitimate user.
For more details about CSRF
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP
Chapter
http://www.slideshare.net/Nilesh_logan/null-its-all-about-csrf
Cross Site Request Forgery - Anti-CSRF token bypass
http://shield4you.blogspot.in/2015/03/cross-site-request-forger-anti-
csrf.html
CSRF Bug – Video
Practical time 
bWAPP – Windows / VM machine
Burp suite-pro
Download link:-
http://sourceforge.net/projects/bwapp/
IDOR
I Insecure
D Direct
O Object
R Reference
#4th Position @OWASP
Highest paid bounty for IDOR - $20,000
 https://fin1te.net/articles/hijacking-a-facebook-account-with-sms/
Example 1:- As simple as that
 https://hackerone.com/reports/49356
Example 2 :- Delete Credit Cards from any
Twitter Account
 https://hackerone.com/reports/27404
Business Impact :-
 Sensitive information retrieval via parameters
 Deleting another user’s information
 Change delivery address of an order.
 View someone's else profile on behalf of authorised user
 Reclaiming other user’s data
Problem ?
1. No Secure Access model.
2. Numeric IDs.
3. Error message show and tell
4. Inconsistent ID sources
E.g. /abcd/test/123
/abcd/?test=123
Practical time 
bWAPP – Windows / VM machine
Burp suite-pro
Download link:-
http://sourceforge.net/projects/bwapp/
IDOR Bug – Video
Lets have Challenge
Before we start :- Final Takeaway
 https://twitter.com/brutelogic/status/649247337190137857
Hold on !!!
The First reporter will get gift vouchers ;)
Online testing site – Test without going jail
TARGET 1
http://testasp.vulnweb.com (Forum - ASP)
Bug to find
1. Open redirection
2. Reflected XSS
3. Stored XSS
PS:
 This presentation is purely to give idea about one of information
security domain (web application) inside view.
 Its up to you to decide right carrier path according to your choice /
likes / dislikes
Questions ?
Thank you 
Comments | Feedback | Suggestions
 Twitter : https://twitter.com/nilesh_loganx
 Email: nilesh.s.sapariya@gmail.com
 Blog: http://shield4you.blogspot.in/
 LinkedIn: https://www.linkedin.com/pub/nilesh-sapariya/39/33/735
 Slide share: http://www.slideshare.net/Nilesh_logan

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ppt
PptPpt
Ppt
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 

Viewers also liked

Establishing a Cyber Defense Information Sharing Framework-(1.5)
Establishing a Cyber Defense Information Sharing Framework-(1.5)Establishing a Cyber Defense Information Sharing Framework-(1.5)
Establishing a Cyber Defense Information Sharing Framework-(1.5)
Kevin Parrish
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (16)

Establishing a Cyber Defense Information Sharing Framework-(1.5)
Establishing a Cyber Defense Information Sharing Framework-(1.5)Establishing a Cyber Defense Information Sharing Framework-(1.5)
Establishing a Cyber Defense Information Sharing Framework-(1.5)
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili SaghafiConference Presenation Cyber security and big data , Prof. Lili Saghafi
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
 
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slidesLMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber Security Workshop @SPIT- 3rd October 2015

Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
fangjiafu
 
Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
Emilio Casbas
 
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
ThreatReel Podcast
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
sudip pudasaini
 

Similar to Cyber Security Workshop @SPIT- 3rd October 2015 (20)

Play,Learn and Hack- CTF Training
Play,Learn and Hack- CTF TrainingPlay,Learn and Hack- CTF Training
Play,Learn and Hack- CTF Training
 
Why should you do a pentest?
Why should you do a pentest?Why should you do a pentest?
Why should you do a pentest?
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
Owasp web application security trends
Owasp web application security trendsOwasp web application security trends
Owasp web application security trends
 
[2.1] Web application Security Trends - Omar Ganiev
[2.1] Web application Security Trends - Omar Ganiev[2.1] Web application Security Trends - Omar Ganiev
[2.1] Web application Security Trends - Omar Ganiev
 
Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
 
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Starwest 2008
Starwest 2008Starwest 2008
Starwest 2008
 
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
How to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyHow to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ Disobey
 
Security testing for web developers
Security testing for web developersSecurity testing for web developers
Security testing for web developers
 

Recently uploaded

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 

Recently uploaded (20)

BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 

Cyber Security Workshop @SPIT- 3rd October 2015