SlideShare uma empresa Scribd logo
1 de 45
Hack in Paris – 2012
Weapons of
mass destruction v4



              Jorge Sebastiao

                                1
Agenda
New World Order
Target Attack
Stuxnet
Flame
Implications
Q&A

                   2
New World




            3
Siberia Pipeline 1982
CIA computer chip “The Logic Bomb”
Natanz
 Peace and
 Prosperity
Nuclear Fuel
Reprocessing
   Plant
News
Persistent Targeted attacks Stats
       Worldwide industry sector since 2008




  18172 targeted attacks during 2010
Target Attacks
Phase        Mass Attack                      Targeted Attack
Incursion    Generic social engineering       Handcrafted & personalized delivery
             By-chance infection              method
Discovery    Typically no discovery           Examination of the infected resource
             Assumes pre-defined content      Monitoring of the user
             Predictable location             Determine accessible resources, &
                                              network enumeration
Capture      Pre-defined specific data        Manual analysis &
             Matches a pre-defined pattern    Inspection of the data
             (IE credit card number)
Exfiltration Information sent to a dump       Information sent back to the
             site with little protection      attacker Not stored in location for
             Dump site is long term storage   extended time period
What?
1. Windows Computer worm discovered in July 2010
2. 100k+ lines of code (complex)
3. 5 different exploits (4 MS vulnerabilities)
   1. LNK File Bug – Initial auto exploitation via removable drive
   2. Task Scheduler – Privilege Escalation VISTA+
   3. Keyboard Layout – Privilege Escalation XP
   4. Spooler / MOF Files – Spreading/Lateral Movement
   5. SMB Vuln (MS08-067) – Spreading/Lateral Movement
4. Rootkit (hiding binaries)

                                                                 9
Paradigm Shift
Consequences for the way we think…




                                     10
Timeline




           11
Focus on Siemens
        PLC
• Targets SCADA networks
  • Siemens Simatic WinCC

• Rootkit to hide itself
   • Classic Windows rootkit
   • PLC (Programmable Logic Controllers)
     code changes also hidden

• Spreads via USB sticks & network shares
• Creates botnet
   • Industrial espionage ready: steal code, documents, project
     designs
   • Injects & hide code in PLCs - modifies production processes


                                                                   12
Overview
• Target
    • Type Nuclear Plant
    • Victim Iran
    • Motivation Destroy Centrifuges

• Compromise
    • Social Engineering – Memory Stick
    • Vector SCADA Systems
    • Vulnerability Windows/Siemens

• Response
    • Disclosure Jun 2010
    • Iran Replaces 1000 Centrifuges
    • Win/Siemens Patches

                                          13
Attack
 Flow
Propagation
Network Propagation
• Peer-to-peer communication & updates
• Infecting WinCC machines via hardcoded database server
  password
• Network shares
• MS10-061 Print Spooler Zero-Day Vulnerability
• MS08-067 Windows Server Service Vulnerability




                                                      16
Testing - Metasploit




                       17
Attack & Anti-Forensics
• Uses encryption / encoding to
  obfuscate / data streams
• Polymorphic
• Zero day attacks
• Root kits to evade detection
• In-memory execution without
  creating files
• Remote Programmable
• Disabling itself
• Hiding Results/Effects
Siemens - SIMATIC PLCs
From Root Kit to PLC




                       20
Hides Feedback




                 21
Resonance - Damage Frequency
• In PLC:
• forces motors to spin:
   • at 2 Hz
   • at 1064 Hz
• Damages connected
  motors




                               22
Distribution




               23
Infection Statistics
• 29 September 2010, From Symantec Infected Hosts
Top Countries




                25
Siemens Infections
         Distribution of Infected Systems with Siemens Software
80.00
        67.60
70.00
60.00
50.00
40.00
30.00
20.00                                                             12.15
                8.10    4.98
10.00                            2.18    2.18    1.56    1.25
 0.00
                          U
                          A
                          S
         N
         A
         R




                                                          N
                                                          D
         I




                                                          A
                                                          I




                                                                   O
                                                                   H
                                                  W




                                                                   R
                                                                   E
                                                                   T
                                                                   S
                                                  N
                                                  A
                                                  T
                                                  I
                                          O
                                          N
                                          D
                                          A
                                          E
                                          S
                                          I
                 O
                 U
                 H
                 A
                 R
                 K
                 E
                 T
                 S




                                  N
                                  G
                                  A
                                  B
                                  R
                                  E
                                  T
                                  I
Result: Attack Critical
   Infrastructure
Target?
                            • Natanz enrichment
                            • Bushehri Nuclear Plant
• 60%+ Infections in Iran
• No commercial gain
• Self destruct date
• Siemens PLC
• Target Nuclear Program
• Enrichment
• Plant
Siemens Response




                   Source: WSJ, NY Times, eWeek




                                           29
SCADA Impact




               30
STRATEGY




           31
Flame
Flame
•Espionage
•Sabotage
•Size/Modularity
•Gaming Language
Risky Leaks
Olympic Games
Prologue
The worm was
loose..
War and Cyberwar
•Stuxnet
•Duqu
•Flame
•…
Recruiting
Quote
Bruce Schneier
Stuxnet a “Mistake”
18 Critical Infrastructure Sectors
Cross-Sector Interdependencies
•Control systems security not sector specific
•Connectivity crosses geographic boundaries
•Sectors not operationally isolated
Cyberwar: Rules of Engagement
China-USA 1998

USA-Iran 200?

Cyberwar=war?
Failure on P>D+R




                   42
Think outside the box




                        43
Creative Weapons




                   44
Questions




Jorge.sebastiao@gmail.com

Mais conteúdo relacionado

Destaque

Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?CA Technologies
 
WE16 - Top Ten Tips for Inclusive Team Meetings
WE16 - Top Ten Tips for Inclusive Team MeetingsWE16 - Top Ten Tips for Inclusive Team Meetings
WE16 - Top Ten Tips for Inclusive Team MeetingsSociety of Women Engineers
 
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce RiskBeyondTrust
 
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...Society of Women Engineers
 
Walking in The Rain
Walking in The RainWalking in The Rain
Walking in The RainBiaEsteves
 
1. 아키텍쳐 설계 프로세스
1. 아키텍쳐 설계 프로세스1. 아키텍쳐 설계 프로세스
1. 아키텍쳐 설계 프로세스Terry Cho
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...CA Technologies
 

Destaque (14)

Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
 
My Awesome Life as an Engineer
My Awesome Life as an EngineerMy Awesome Life as an Engineer
My Awesome Life as an Engineer
 
WE16 - Increasing Equity in Faculty Searches
WE16 - Increasing Equity in Faculty SearchesWE16 - Increasing Equity in Faculty Searches
WE16 - Increasing Equity in Faculty Searches
 
WE16 - Top Ten Tips for Inclusive Team Meetings
WE16 - Top Ten Tips for Inclusive Team MeetingsWE16 - Top Ten Tips for Inclusive Team Meetings
WE16 - Top Ten Tips for Inclusive Team Meetings
 
WE16 - Dream Job or Dream Company?
WE16 - Dream Job or Dream Company?WE16 - Dream Job or Dream Company?
WE16 - Dream Job or Dream Company?
 
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
 
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
 
Walking in The Rain
Walking in The RainWalking in The Rain
Walking in The Rain
 
1. 아키텍쳐 설계 프로세스
1. 아키텍쳐 설계 프로세스1. 아키텍쳐 설계 프로세스
1. 아키텍쳐 설계 프로세스
 
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice ConfigurationEMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
 
EMEA Airheads ClearPass guest with MAC- caching using Time Source
EMEA Airheads ClearPass guest with MAC- caching using Time SourceEMEA Airheads ClearPass guest with MAC- caching using Time Source
EMEA Airheads ClearPass guest with MAC- caching using Time Source
 
The new imperative in the data center with workload centric networking
The new imperative in the data center with workload centric networkingThe new imperative in the data center with workload centric networking
The new imperative in the data center with workload centric networking
 
Data center network reference architecture with hpe flex fabric
Data center network reference architecture with hpe flex fabricData center network reference architecture with hpe flex fabric
Data center network reference architecture with hpe flex fabric
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 

Mais de Jorge Sebastiao

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchainJorge Sebastiao
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3Jorge Sebastiao
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startupsJorge Sebastiao
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3Jorge Sebastiao
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0Jorge Sebastiao
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH editionJorge Sebastiao
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart CityJorge Sebastiao
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0Jorge Sebastiao
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsJorge Sebastiao
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Jorge Sebastiao
 
AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1Jorge Sebastiao
 
Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Jorge Sebastiao
 
Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Jorge Sebastiao
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Jorge Sebastiao
 
Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Jorge Sebastiao
 
RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4Jorge Sebastiao
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumJorge Sebastiao
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasJorge Sebastiao
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?Jorge Sebastiao
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Jorge Sebastiao
 

Mais de Jorge Sebastiao (20)

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchain
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startups
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart City
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threats
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3
 
AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1
 
Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2
 
Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3
 
Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2
 
RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance Forum
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and Gas
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7
 

Último

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Último (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Weapons of max destruction v41

Notas do Editor

  1. This is a sample Pie Chart slide, ideal for communicating product or market segmentation information. To Change Font Color/Size: Select text, right-click and adjust the font setting on the Mini toolbar . Select desired attributes to change: font, size, boldness, color, etc. Note: many of the same commands can also be accessed from the Font group of the Home tab. Edit Chart: Click the chart to edit and select the Chart Tools Design tab (or double-click on the chart). Click the Edit Data button to access the underlying Excel 2007 spreadsheet. Copying Data From a Separate Excel Spreadsheet: From an existing Excel spreadsheet, select the range of cells to be copied, select copy (Ctrl C). In PowerPoint, click the chart to edit and select the Chart Tools Design tab (or double-click on the chart.) Click the Edit Data button to open the spreadsheet for editing. Select all the data in the Chart in Microsoft Office PowerPoint spreadsheet by clicking the top left corner cell, right-click and select Delete Click in the first empty cell of the spreadsheet and paste (Ctrl V) to place the data copied from the other Excel file. Change Orientation: Click the chart to edit and select the Chart Tools Design tab (or double-click on the chart.) Click the Switch Row/Column button. If the Switch Row/Column button is disabled, click the Select Data button and then click the Switch Row/Column button from within the Select Data Source dialog box, click OK . La Nuit du Hack Tracking and Implications of Stuxnet
  2. La Nuit du Hack Tracking and Implications of Stuxnet
  3. La Nuit du Hack Tracking and Implications of Stuxnet
  4. La Nuit du Hack Tracking and Implications of Stuxnet
  5. La Nuit du Hack Tracking and Implications of Stuxnet
  6. La Nuit du Hack Tracking and Implications of Stuxnet
  7. Countries other than Iran are likely to be collateral damage La Nuit du Hack Tracking and Implications of Stuxnet
  8. La Nuit du Hack Tracking and Implications of Stuxnet
  9. La Nuit du Hack Tracking and Implications of Stuxnet
  10. La Nuit du Hack Tracking and Implications of Stuxnet
  11. La Nuit du Hack Tracking and Implications of Stuxnet
  12. La Nuit du Hack Tracking and Implications of Stuxnet
  13. La Nuit du Hack Tracking and Implications of Stuxnet