SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
@gvarisco#Voxxed
DevOoops
(Increase  awareness  around
DevOps infra  security)
Gianluca Varisco
@gvarisco#Voxxed
$  whoami
• Head of Global Security @ Rocket Internet SE
• Formerly at Red Hat, Bravofly Rumbo Group, PrivateWave
@gvarisco#Voxxed
Agenda
• GitHub
• Revision control tools
• Continuous integration tools
• AWS config files
• Client provisioning tools
• Elasticsearch
• In-memory databases
@gvarisco#Voxxed
GitHub
@gvarisco#Voxxed
GitHub – Search  
• It does support “advanced” search operators, eg.
• extension:conf ftp server configuration
• extension:pem private
• extension:xls mail
• extension:sql mysql dump
• extension:php “preg_replace(“/(.+)/e”
(a possible flaw that allows Remote Code Execution)
• OSINT (within Companies’ / employees’ repos)
@gvarisco#Voxxed
GitHub – Impersonating  others  
• Pushing code to GitHub as Linus Torvalds
People trust
pictures!
@gvarisco#Voxxed
GitHub – Impersonating  others  /2  
• Hey, look! Linus is the main committer of my
github.com:gvarisco/swag.git repo!
• Sad truth! Design flaw or targeted feature? Official response
below…
@gvarisco#Voxxed
GitHub – Learnings  /  TODOs
• Always audit who has access to your repos
• Be suspicious of pull requests with other authors’ code
within the PR.
• Always delete a private fork of a private organization
repository if a member leaves your organization.
• Audit organization members for 2-step verification
@gvarisco#Voxxed
Revision control
tools
@gvarisco#Voxxed
.git Exposure
• Does your website expose the .git/ folder on
a webserver out there?
• Access to such content lets you download the full source code
• tl;dr: NO, DirectoryIndex (Apache) / autoindex (nginx)
ON/OFF is NOT the FIX!
@gvarisco#Voxxed
.git Exposure  /  What  can  you  get?
• Source code, config files, credentials, developer names
public/privatekeys, SSL certificates, e-mail addresses, etc.
• Repo HISTORY (security issues fixed, password wrongly
committed and removed later)
• Archives / Backups / {MySQL,PostgreSQL,$xyzSQL} dumps
• Session generation keys
@gvarisco#Voxxed
.git Exposure  /  DirectoryIndex ON
$ mkdir website-source-code
$ cd website-source-code
$ wget --mirror --include-directories=/.git http://www.example.com/.git
$ cd www.example.com
$ git reset --hard
HEAD is now at [...]
@gvarisco#Voxxed
.git Exposure  /  DirectoryIndex OFF
• Git-fsck to the rescue!
• Bruteforce: Predictable file names and known object hashes, etc.
• DVCS-Pillage/DVCS-Ripper do it for you.
• Many admins tend to answer either 403 or 404 for .git/, but
.git/config works just fine.
• Git stores file information within the objects folder.
@gvarisco#Voxxed
Abusing  the  .git/ Objects  folder
• See the SHA-1 for index.php:
$ git cat-file -p master^{tree}
• Take the SHA-1 and give it to ‘git cat-file’ to print out the file
contents:
@gvarisco#Voxxed
Subversion  1.6.x
• 1.6.x and earlier
• Check for .entries files
• Walk SVN chain to retrieve all files. Metasploit does it for you
(auxiliary/scanner/http/svn_scanner)
@gvarisco#Voxxed
Subversion  1.7.x
• 1.7.x uses SQLite.
• Metasploit’s auxiliary/scanner/http/svn_wcdb_scanner to the
rescue! It will find SVN’s wc.db for you.
• As we know the file name and the SHA-1 used, we can map all files:
$ sqlite3 wc.db 'select local_relpath, ".svn/pristine/" || substr(checksum,7,2) || "/" || substr(checksum,7)
|| ".svn-base" as alpha from NODES;'
index.php|.svn/pristine/4e/4e6a225331f9ae872db25a8f85ae7be05cea6d51.svn-base
scripts/menu.js|.svn/pristine/fa/fabeb3ba6a96cf0cbcad1308abdbe0c2427eeebf.svn-base
style/style.js|.svn/pristine/2s/2cc5590e0ba024c3db77a13896da09b39ea74799.svn-base
...
$ wget -O -
http://www.example.com/.svn/pristine/4e/4e6a225331f9ae872db25a8f85ae7be05cea6d51.svn-base
<?php
@gvarisco#Voxxed
Continuous
integration
tools
@gvarisco#Voxxed
Jenkins
• The leading open-source continuous integration server. Built with
Java, it provides 985 plugins to support building and testing virtually
any project.
• Latest and greatest release: 1.609 (12/04/2015)
• A few security advisories..
@gvarisco#Voxxed
Jenkins  – Searches  on  Shodan
@gvarisco#Voxxed
Abusing  Jenkins
• Metasploit module: auxiliary/scanner/http/jenkins_enum
It numerates a remote Jenkins installation in an unauthenticated
manner, including host operating system and and Jenkins installation
details.
• Metasploit module: exploit/multi/http/jenkins_script_console
It uses the Jenkins Groovy script console to execute OS commands
using Java.
• If no authentication is required, it is trivial to gain
remote code execution via script console
@gvarisco#Voxxed
Abusing  Jenkins  – Script  console
• Wanna display jenkins’ user private SSH key? No problem!
It is as simple as executing:
println new ProcessBuilder('sh','-c','cat
/Users/batman/.ssh/id_rsa').redirectErrorStream(true).start().text
@gvarisco#Voxxed
Abusing  Jenkins
• Last, but not least:
• If you have access to /view/All/newJob, create new builds
and run commands.
• Browse WORKSPACEs, read config/ folders
containing sensitive data, eg. Passwords / DB
credentials / API keys
@gvarisco#Voxxed
AWS config files
@gvarisco#Voxxed
AWS  CLI  DEVELOPMENT  TOOLS
• ALL credentials are stored in plaintext in
““hidden files””, eg. (.foo/bar)
• Typically privileged accesses
• Once credentials are found, any of the open source libraries
available out there can interact with AWS
(eg. Nimbostratus, AWS Command Line Interface)
• OSINT / Information leakage (via GitHub, Pastebins, etc.)
@gvarisco#Voxxed
Client
provisioning
tools
@gvarisco#Voxxed
Puppet
• If you expose a dashboard (eg. PuppetBoard/PuppetDB),
be careful with your custom FACTS
• Encrypt your sensitive YAML files’ information
(if you use HIERA, a key/value lookup tool for config data) with
HIERA-EYAML.
• It does provide asymmetric encryption of sensitive data
• Store the KEYS securely when using puppet (only puppetmaster
needs access to them in order to perform decryption when the
agent runs on a remote node)
@gvarisco#Voxxed
Puppet  – Hiera-­EYAML
@gvarisco#Voxxed
Chef
• Web Interface (Chef Server), Rails powered, uses
admin / p@ssw0rd1 as default credentials
@gvarisco#Voxxed
Chef
• Databags items (eg. MySQL data) can be encrypted
• Use knife – a cli tool that provides an interface between
a local chef-repo and the Chef server
@gvarisco#Voxxed
Vagrant
• Did you change your SSH keys?
• Vagrant 1.7+ embeds
vagrant-rekey-ssh
plug-in
@gvarisco#Voxxed
Vagrant
• Common user/passwords:
root/vagrant OR
vagrant/vagrant
• NO pass to sudo L
@gvarisco#Voxxed
Vagrant  – Scans  using  def.  privkey
@gvarisco#Voxxed
Vagrant  – Breaking  in!
• The Vagrant workflow encourages you to edit your code
outside the VM. That’s why Vagrant helpfully shares the project
directory as /vagrant/ in the VM.
“Put evil things in /vagrant/.git/hooks/post-commit and wait for
the user to commit some code. Since the /vagrant/ directory is
mounted from the host, my hook will persist even if the user
destroys the VM.”
• Note: This trick should work for any other commonly used
VCS.
@gvarisco#Voxxed
Kickstart files  (RedHat,  CentOS,  ..)
• Root passwords are either set:
• During installation
• Crypted hash defined in the KS file (rootpw –iscrypted)
• Clear text defined in the KS file (rootpw –plaintext)
@gvarisco#Voxxed
Elasticsearch
@gvarisco#Voxxed
Elasticsearch
• A distributed full-text search engine with a RESTful web
interface and schema-free JSON documents
• 9200/TCP (GET request shows version)
• No authentication
• Can search stored data via HTTP API
• Update data with PUT requests
• Join an existing, open cluster and get all the data
• Remote code execution prior to 1.2.0
@gvarisco#Voxxed
Elasticsearch
• Own a server with a query like this
(as the search function allows dynamic scripts execution):
• 1.3.x adds a sandbox to control what classes and functions can be
executed.
• Add ‘script.disable_dynamic: true’ to your elasticsearch.yml
• Make sure your instance is only binding on localhost
@gvarisco#Voxxed
Elasticsearch – Read  inside  /etc
@gvarisco#Voxxed
In-memory
databases
@gvarisco#Voxxed
Redis
• Default config:
• No encrypted communication
• No credentials
• 6379/TCP
• Binds to all interfaces
@gvarisco#Voxxed
Redis – Shodan results
@gvarisco#Voxxed
Abusing  Redis instances
@gvarisco#Voxxed
Redis – “Funny”  commands
• FLUSHALL (Remove all keys from all databases)
• SCRIPT LOAD
• EVAL / EVALSHA
@gvarisco#Voxxed
Memcache
• Free & open-source, high-performance, distributed
memory object caching system
• Fun things get put into memcache
• Secure it:
• First and always, FIREWALL
• Check your bindings (interfaces)
• If you need it, use SASL
• DO NOT RUN AS ROOT
@gvarisco#Voxxed
Memcache – Interesting  findings..
@gvarisco#Voxxed
And  now  what?
• Add authentication to Jenkins
• Make sure all your tools/systems are only available
from/to hosts that need it
• Change default private keys everywhere
• Update to latest versions all of your devops tools
@gvarisco#Voxxed
THANKS!
Questions?
@gvarisco#Voxxed
Credits
• Ken Johnson
• Chris Gates
• Rocket Internet’s Security Team

Contenu connexe

Tendances

Power on, Powershell
Power on, PowershellPower on, Powershell
Power on, Powershell
Roo7break
 

Tendances (19)

ContainerCon sysdig Slides
ContainerCon sysdig Slides ContainerCon sysdig Slides
ContainerCon sysdig Slides
 
Puppetconf 2015 - Puppet Reporting with Elasticsearch Logstash and Kibana
Puppetconf 2015 - Puppet Reporting with Elasticsearch Logstash and KibanaPuppetconf 2015 - Puppet Reporting with Elasticsearch Logstash and Kibana
Puppetconf 2015 - Puppet Reporting with Elasticsearch Logstash and Kibana
 
Power on, Powershell
Power on, PowershellPower on, Powershell
Power on, Powershell
 
Container Security
Container SecurityContainer Security
Container Security
 
DockerCon SF 2015: Docker Security
DockerCon SF 2015: Docker SecurityDockerCon SF 2015: Docker Security
DockerCon SF 2015: Docker Security
 
Containers and Security for DevOps
Containers and Security for DevOpsContainers and Security for DevOps
Containers and Security for DevOps
 
From P0W3R to SH3LL
From P0W3R to SH3LLFrom P0W3R to SH3LL
From P0W3R to SH3LL
 
Velocity 2011 Chef OpenStack Workshop
Velocity 2011 Chef OpenStack WorkshopVelocity 2011 Chef OpenStack Workshop
Velocity 2011 Chef OpenStack Workshop
 
Testing with Ansible
Testing with AnsibleTesting with Ansible
Testing with Ansible
 
Docker & Daily DevOps
Docker & Daily DevOpsDocker & Daily DevOps
Docker & Daily DevOps
 
Veer's Container Security
Veer's Container SecurityVeer's Container Security
Veer's Container Security
 
DockerCon EU 2015: Persistent, stateful services with docker cluster, namespa...
DockerCon EU 2015: Persistent, stateful services with docker cluster, namespa...DockerCon EU 2015: Persistent, stateful services with docker cluster, namespa...
DockerCon EU 2015: Persistent, stateful services with docker cluster, namespa...
 
Docker Advanced registry usage
Docker Advanced registry usageDocker Advanced registry usage
Docker Advanced registry usage
 
RSA APJ Velociraptor Lab
RSA APJ Velociraptor LabRSA APJ Velociraptor Lab
RSA APJ Velociraptor Lab
 
Docker Security Overview
Docker Security OverviewDocker Security Overview
Docker Security Overview
 
Oracle database on Docker Container
Oracle database on Docker ContainerOracle database on Docker Container
Oracle database on Docker Container
 
PowerShell for Cyber Warriors - Bsides Knoxville 2016
PowerShell for Cyber Warriors - Bsides Knoxville 2016PowerShell for Cyber Warriors - Bsides Knoxville 2016
PowerShell for Cyber Warriors - Bsides Knoxville 2016
 
Test-Driven Infrastructure with Ansible, Test Kitchen, Serverspec and RSpec
Test-Driven Infrastructure with Ansible, Test Kitchen, Serverspec and RSpecTest-Driven Infrastructure with Ansible, Test Kitchen, Serverspec and RSpec
Test-Driven Infrastructure with Ansible, Test Kitchen, Serverspec and RSpec
 
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
 

Similaire à DevOoops (Increase awareness around DevOps infra security) - VoxxedDays Ticino '15

Hadoop 20111117
Hadoop 20111117Hadoop 20111117
Hadoop 20111117
exsuns
 
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilitiesVorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
DefconRussia
 
A new model for Docker image distribution
A new model for Docker image distributionA new model for Docker image distribution
A new model for Docker image distribution
Docker, Inc.
 
Inside Sqale's Backend at RubyConf Taiwan 2012
Inside Sqale's Backend at RubyConf Taiwan 2012Inside Sqale's Backend at RubyConf Taiwan 2012
Inside Sqale's Backend at RubyConf Taiwan 2012
Gosuke Miyashita
 
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit
 

Similaire à DevOoops (Increase awareness around DevOps infra security) - VoxxedDays Ticino '15 (20)

Road to Opscon (Pisa '15) - DevOoops
Road to Opscon (Pisa '15) - DevOoopsRoad to Opscon (Pisa '15) - DevOoops
Road to Opscon (Pisa '15) - DevOoops
 
WTF my container just spawned a shell!
WTF my container just spawned a shell!WTF my container just spawned a shell!
WTF my container just spawned a shell!
 
06 integrate elasticsearch
06 integrate elasticsearch06 integrate elasticsearch
06 integrate elasticsearch
 
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
 
Introduction to InSpec and 1.0 release update
Introduction to InSpec and 1.0 release updateIntroduction to InSpec and 1.0 release update
Introduction to InSpec and 1.0 release update
 
Deep Dive: Alfresco Core Repository (... embedded in a micro-services style a...
Deep Dive: Alfresco Core Repository (... embedded in a micro-services style a...Deep Dive: Alfresco Core Repository (... embedded in a micro-services style a...
Deep Dive: Alfresco Core Repository (... embedded in a micro-services style a...
 
Hadoop 20111117
Hadoop 20111117Hadoop 20111117
Hadoop 20111117
 
How to integrate_custom_openstack_services_with_devstack
How to integrate_custom_openstack_services_with_devstackHow to integrate_custom_openstack_services_with_devstack
How to integrate_custom_openstack_services_with_devstack
 
Openstack – An introduction
Openstack – An introductionOpenstack – An introduction
Openstack – An introduction
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with Elasticsearch
 
Docker Runtime Security
Docker Runtime SecurityDocker Runtime Security
Docker Runtime Security
 
Best Practices for Running Kafka on Docker Containers
Best Practices for Running Kafka on Docker ContainersBest Practices for Running Kafka on Docker Containers
Best Practices for Running Kafka on Docker Containers
 
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilitiesVorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
 
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
 
An intro to Azure Data Lake
An intro to Azure Data LakeAn intro to Azure Data Lake
An intro to Azure Data Lake
 
A new model for Docker image distribution
A new model for Docker image distributionA new model for Docker image distribution
A new model for Docker image distribution
 
Inside Sqale's Backend at RubyConf Taiwan 2012
Inside Sqale's Backend at RubyConf Taiwan 2012Inside Sqale's Backend at RubyConf Taiwan 2012
Inside Sqale's Backend at RubyConf Taiwan 2012
 
LasCon 2014 DevOoops
LasCon 2014 DevOoops LasCon 2014 DevOoops
LasCon 2014 DevOoops
 
Real-Time Distributed and Reactive Systems with Apache Kafka and Apache Accumulo
Real-Time Distributed and Reactive Systems with Apache Kafka and Apache AccumuloReal-Time Distributed and Reactive Systems with Apache Kafka and Apache Accumulo
Real-Time Distributed and Reactive Systems with Apache Kafka and Apache Accumulo
 
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
 

Dernier

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Dernier (20)

Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 

DevOoops (Increase awareness around DevOps infra security) - VoxxedDays Ticino '15