SlideShare une entreprise Scribd logo
1  sur  59
1 Web Insecurity  and  Browser Exploitation brought to you by Michele “AntiSnatchOr” Orrù                      and Integrating Web LTD 20th January 2009
http://www.integratingweb.com http://antisnatchor.com Who am I? ,[object Object]
Bachelor Degree in Internet Sciences
Owner of http://antisnatchor.com security advisory blog
JEE developerOutline 2 of 59
http://www.integratingweb.com http://antisnatchor.com Seminar outline  ,[object Object]
Practical demonstrations of some vulnerable Real World web applications (my totally independent security research)
Understand the impact of these threats on the most valuable web-app assets
Practical screen-casts that show how attackers exploit common flows
Browser exploitation discussionSeminar outline 3 of 59
http://www.integratingweb.com http://antisnatchor.com What we will discuss: ,[object Object]
CWE-116: Improper Encoding or Escaping of Output
CWE-209: Error Message Information Leak
CWE-89: Failure to Preserve SQL Query Structure (SQL injection)
CWE-79: Failure to Preserve Web Page Structure (XSS)
CWE-352: Cross-Site Request Forgery (XSRF)What we will discuss 4 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-20: Improper Input Validation ,[object Object]
Improper Input Validation can lead to security vulnerabilities when attackers can modify input in unexpected ways for the application
The only way to protect our applications is by understanding that all input can be maliciousCWE-20: Improper Input Validation 5 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-20: Example ,[object Object],CWE-20: Example 6 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-20: Example ,[object Object]
DNS based website blacklist can be bypassed by providing a forged request with a custom HTTP headerHttp request: GET / HTTP/1.1 X-DecoyHost: www.milw0rm.org Host: www.blocked.org CWE-20: Example 7 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-20: Mitigation ,[object Object]
Whitelist approachinstead of blacklist (you are certainly going to miss some character encoding variants)
WebApp case: use a WebApp Firewall (ModSecurity/F5) or an Input Validation Framework for your language.CWE-20: Mitigation 8 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-20: MitigationModSecurity CWE-20: Mitigation with ModSecurity 9 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-20:MITIGATION OWASP ESAPI ,[object Object]
Authentication
Access Control
Input Validation
Output Encoding
Cryptography
Error handling/loggingCWE-20:MITIGATION OWASP ESAPI 10 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-20: MITIGATION PHPIDS CWE-20: MITIGATION PHPIDS ,[object Object]
Developed by skilled hackers (Mario Heiderich  - .mario on sla.ckers.org)
Try their demo with your nasty attack vectors here: http://demo.php-ids.org
Integrated as a module in Drupal, works with the powerful Zend Framework (http://forum.php-ids.org/comments.php?DiscussionID=113)11 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-116: Improper Encoding/Escaping of Output ,[object Object]
Even if input has been filtered, application output could not be safe:  it need to be encoded too
Common examples: HTML/JavaScript injection on web based applicationsCWE-116: Improper Encoding of Output 12 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-116: Example ,[object Object],CWE-116: Example 13 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-116: Example ,[object Object]
Java Exception stack trace was not  HTML-encoded, so we can inject an iframeGET 		/birt-viewer/run?__report='"><iframe%20src=javascript:alert(666)>&r=-703171660 	HTTP/1.1 		Host: localhost:8780 ,[object Object],CWE-116: Example 14 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-116: Mitigation ,[object Object]
Always encode application output, especially if it contains previously user-supplied input
WebApp firewall and ESAPI/PHPIDS (you lazy developers :-))CWE-116: Mitigation 15 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-209: Error Message Information Leak ,[object Object]
This information is used in the Penetration Testing phase called “Reconnaissance”
Even these little secrets can greatly simplify a more concerted attack that yields much bigger rewardsCWE-209: Error Message Information Leak 16 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-209: Examples1. www.dm.unibo.it ,[object Object]
MySQL error when forging a malicious request altering the anno parameterGET /seminari/archivio.php?anno=2008%27 HTTP/1.1 Host: www.dm.unibo.it [...] Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 300 Proxy-Connection: keep-alive Cookie: dm=[...] CWE-209:  www.dm.unibo.it 17 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-209: Examples1. www.dm.unibo.it ,[object Object],CWE-209:  www.dm.unibo.it ,[object Object]
We can now run more targeted attacks18 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-209: Examples2. uniwex.unibo.it ,[object Object]
Session Management was (IS actually) broken and can be manipulated
If we are the hacker riding the victim’s session, and the victim then logout from Uniwex, his session (and ours, because is the same) is invalidated.
If we invalidate a session and then we try to submit the previously “invalid” session token... MAGICALLY ...CWE-209:  unibo.unibo.it 19 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-209: Examples2. uniwex.unibo.it CWE-209:  unibo.unibo.it 20 of 59
http://www.integratingweb.com http://antisnatchor.com CWE-209: Examples2. uniwex.unibo.it ,[object Object]

Contenu connexe

Tendances

Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web InterfacesThey Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
michelemanzotti
 
[CB16] 80時間でWebを一周:クロムミウムオートメーションによるスケーラブルなフィンガープリント by Isaac Dawson
[CB16] 80時間でWebを一周:クロムミウムオートメーションによるスケーラブルなフィンガープリント by Isaac Dawson[CB16] 80時間でWebを一周:クロムミウムオートメーションによるスケーラブルなフィンガープリント by Isaac Dawson
[CB16] 80時間でWebを一周:クロムミウムオートメーションによるスケーラブルなフィンガープリント by Isaac Dawson
CODE BLUE
 
Внедрение безопасности в веб-приложениях в среде выполнения
Внедрение безопасности в веб-приложениях в среде выполненияВнедрение безопасности в веб-приложениях в среде выполнения
Внедрение безопасности в веб-приложениях в среде выполнения
Positive Hack Days
 

Tendances (20)

Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10
 
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web InterfacesThey Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
 
Virtually Pwned
Virtually PwnedVirtually Pwned
Virtually Pwned
 
Secure Programming And Common Errors Part II
Secure Programming And Common Errors Part IISecure Programming And Common Errors Part II
Secure Programming And Common Errors Part II
 
Security Function
Security FunctionSecurity Function
Security Function
 
[CB16] 80時間でWebを一周:クロムミウムオートメーションによるスケーラブルなフィンガープリント by Isaac Dawson
[CB16] 80時間でWebを一周:クロムミウムオートメーションによるスケーラブルなフィンガープリント by Isaac Dawson[CB16] 80時間でWebを一周:クロムミウムオートメーションによるスケーラブルなフィンガープリント by Isaac Dawson
[CB16] 80時間でWebを一周:クロムミウムオートメーションによるスケーラブルなフィンガープリント by Isaac Dawson
 
Advanced SQL Injection
Advanced SQL InjectionAdvanced SQL Injection
Advanced SQL Injection
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
Внедрение безопасности в веб-приложениях в среде выполнения
Внедрение безопасности в веб-приложениях в среде выполненияВнедрение безопасности в веб-приложениях в среде выполнения
Внедрение безопасности в веб-приложениях в среде выполнения
 
End to end web security
End to end web securityEnd to end web security
End to end web security
 
На страже ваших денег и данных
На страже ваших денег и данныхНа страже ваших денег и данных
На страже ваших денег и данных
 
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
 
Serverless Security: Defence Against the Dark Arts
Serverless Security: Defence Against the Dark ArtsServerless Security: Defence Against the Dark Arts
Serverless Security: Defence Against the Dark Arts
 
Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking Tutorial
 
Web Application Security in front end
Web Application Security in front endWeb Application Security in front end
Web Application Security in front end
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodology
 

En vedette

Software maliciós i fraus en linea
Software maliciós i fraus en lineaSoftware maliciós i fraus en linea
Software maliciós i fraus en linea
quedamosenmicama
 
Thomas Lynch Racing Team Bohunk Rev2
Thomas Lynch Racing Team Bohunk Rev2Thomas Lynch Racing Team Bohunk Rev2
Thomas Lynch Racing Team Bohunk Rev2
xcrracer2
 
V8 a-primer video a insertar-imagenes evaluacion
V8 a-primer video a insertar-imagenes evaluacionV8 a-primer video a insertar-imagenes evaluacion
V8 a-primer video a insertar-imagenes evaluacion
INFOD
 
Provost Studio_Portfolio_ALL PROJECTS_email
Provost Studio_Portfolio_ALL PROJECTS_emailProvost Studio_Portfolio_ALL PROJECTS_email
Provost Studio_Portfolio_ALL PROJECTS_email
pprovost3673
 
Creating Relationships Presentations
Creating Relationships PresentationsCreating Relationships Presentations
Creating Relationships Presentations
sallyleehall
 

En vedette (18)

Software maliciós i fraus en linea
Software maliciós i fraus en lineaSoftware maliciós i fraus en linea
Software maliciós i fraus en linea
 
PROVOST STUDIO-Firm Profile & Experience
PROVOST STUDIO-Firm Profile & ExperiencePROVOST STUDIO-Firm Profile & Experience
PROVOST STUDIO-Firm Profile & Experience
 
Iss
IssIss
Iss
 
software maliciós
software malicióssoftware maliciós
software maliciós
 
Thomas Lynch Racing Team Bohunk Rev2
Thomas Lynch Racing Team Bohunk Rev2Thomas Lynch Racing Team Bohunk Rev2
Thomas Lynch Racing Team Bohunk Rev2
 
Peter Provost-Selected Work (BRANDSPACE)
Peter Provost-Selected Work (BRANDSPACE)Peter Provost-Selected Work (BRANDSPACE)
Peter Provost-Selected Work (BRANDSPACE)
 
Iss
IssIss
Iss
 
IES VALLDEMOSSA
IES VALLDEMOSSAIES VALLDEMOSSA
IES VALLDEMOSSA
 
V8 a-primer video a insertar-imagenes evaluacion
V8 a-primer video a insertar-imagenes evaluacionV8 a-primer video a insertar-imagenes evaluacion
V8 a-primer video a insertar-imagenes evaluacion
 
Provost Studio_Portfolio_ALL PROJECTS_email
Provost Studio_Portfolio_ALL PROJECTS_emailProvost Studio_Portfolio_ALL PROJECTS_email
Provost Studio_Portfolio_ALL PROJECTS_email
 
Què és internet?
Què és internet?Què és internet?
Què és internet?
 
Integra Micro Software Services (P) Ltd. - Imaging Expertise
Integra Micro Software Services (P) Ltd. - Imaging ExpertiseIntegra Micro Software Services (P) Ltd. - Imaging Expertise
Integra Micro Software Services (P) Ltd. - Imaging Expertise
 
Compost
Compost Compost
Compost
 
Jobs And Professions
Jobs And ProfessionsJobs And Professions
Jobs And Professions
 
Dr. Strangelove or: How I Learned to Stop Worrying and Love the BeEF
Dr. Strangelove or: How I Learned to Stop Worrying and Love the BeEFDr. Strangelove or: How I Learned to Stop Worrying and Love the BeEF
Dr. Strangelove or: How I Learned to Stop Worrying and Love the BeEF
 
compost javier
compost javier compost javier
compost javier
 
Globalization
GlobalizationGlobalization
Globalization
 
Creating Relationships Presentations
Creating Relationships PresentationsCreating Relationships Presentations
Creating Relationships Presentations
 

Similaire à Web Insecurity And Browser Exploitation

Encoded Attacks And Countermeasures
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
Marco Morana
 
Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
Emilio Casbas
 
Methods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall EngMethods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall Eng
Dmitry Evteev
 
Web Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security ForgotWeb Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security Forgot
Jeremiah Grossman
 
Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009
mirahman
 

Similaire à Web Insecurity And Browser Exploitation (20)

Widespread security flaws in web application development 2015
Widespread security flaws in web  application development 2015Widespread security flaws in web  application development 2015
Widespread security flaws in web application development 2015
 
Web Security
Web SecurityWeb Security
Web Security
 
Security Tech Talk
Security Tech TalkSecurity Tech Talk
Security Tech Talk
 
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdftheVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
 
Patch Tuesday Analysis - December 2015
Patch Tuesday Analysis - December 2015Patch Tuesday Analysis - December 2015
Patch Tuesday Analysis - December 2015
 
Encoded Attacks And Countermeasures
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
 
Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
 
Sql Injections With Real Life Scenarious
Sql Injections With Real Life ScenariousSql Injections With Real Life Scenarious
Sql Injections With Real Life Scenarious
 
Methods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall EngMethods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall Eng
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Owasp web application security trends
Owasp web application security trendsOwasp web application security trends
Owasp web application security trends
 
[2.1] Web application Security Trends - Omar Ganiev
[2.1] Web application Security Trends - Omar Ganiev[2.1] Web application Security Trends - Omar Ganiev
[2.1] Web application Security Trends - Omar Ganiev
 
Input validation slides of web application workshop
Input validation slides of web application workshopInput validation slides of web application workshop
Input validation slides of web application workshop
 
Web Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security ForgotWeb Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security Forgot
 
Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009
 
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
 
Day8
Day8Day8
Day8
 
String.fromCharCode(60)script>alert("XSS")String.fromCharCode(60)/script>
String.fromCharCode(60)script>alert("XSS")String.fromCharCode(60)/script>String.fromCharCode(60)script>alert("XSS")String.fromCharCode(60)/script>
String.fromCharCode(60)script>alert("XSS")String.fromCharCode(60)/script>
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Web Insecurity And Browser Exploitation