SlideShare uma empresa Scribd logo
1 de 103
NO BULLSHIT Underground crime: traces, trends, attribution, and more   ,[object Object],http://null.co.in/ http://nullcon.net/
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Still .. meet the “authors”.. :) http://null.co.in/ http://nullcon.net/ Started as hobby project We talked about this At c0c0n Here you’ll see  Some fresh stuff Why? ... Something we do When we need a Good laugh :)
Чтобы заработь на Интернете не нужно ничего и даже мозгов  ничего и даже мозгов  ,[object Object],My favorite quote:
But it is not only about money
Attack attribution http://null.co.in/ http://nullcon.net/
General: $$ vs. APT ,[object Object],[object Object],http://null.co.in/ http://nullcon.net/
A word on attribution ,[object Object],http://null.co.in/ http://nullcon.net/
Points to note ,[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Brief: Data sources and Tools (covered in workshop) http://null.co.in/ http://nullcon.net/
Data analysis and sources ,[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Intelligence Gathering ,[object Object],http://null.co.in/ http://nullcon.net/
Automation:  difficulties difficulties ,[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Ex.: What does this say? http://null.co.in/ http://nullcon.net/
Good luck w/ automated translation ,[object Object],http://null.co.in/ http://nullcon.net/
Slang sources ,[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/ Team Cymru has a nice research on russian slang. Not repeated here
Tools of trade ,[object Object],http://null.co.in/ http://nullcon.net/
So, russian underground - mafia or geeks? :) http://null.co.in/ http://nullcon.net/
From russia with ... ,[object Object],http://null.co.in/ http://nullcon.net/
-malware - http://null.co.in/ http://nullcon.net/ Stuff that lives in your PC Against your will :)
Typical export sample: ,[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Looks familiar? http://null.co.in/ http://nullcon.net/
Моscow arest (31/08/2010) http://null.co.in/ http://nullcon.net/ Annual income: over 500,000 rubles (100,000USD) One unlock charged at 300 rubles (10USD)  Via SMS
Scale: big http://null.co.in/ http://nullcon.net/
“export” through legitimate sites http://null.co.in/ http://nullcon.net/
Which end up in  Google blacklist Google blacklist http://null.co.in/ http://nullcon.net/
Why such spike? ,[object Object],[object Object],http://null.co.in/ http://nullcon.net/
But there’s much more.. http://null.co.in/ http://nullcon.net/ malware OTHER COOL STUFF :-)
That’s not a russian hax0r http://null.co.in/ http://nullcon.net/
This is closer..  http://null.co.in/ http://nullcon.net/
Insight on underground market ,[object Object],http://null.co.in/ http://nullcon.net/
We don’t sell or advertize any service ,[object Object],http://null.co.in/ http://nullcon.net/ Disclaimer:
“We are after the money!” ;-) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
“Ликбез” ,[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Online currencies ,[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
More payment systems http://null.co.in/ http://nullcon.net/
Exchange points http://null.co.in/ http://nullcon.net/
Trading rules http://null.co.in/ http://nullcon.net/ Guarantee service
Service verification http://null.co.in/ http://nullcon.net/
blacklists http://null.co.in/ http://nullcon.net/
White lists http://null.co.in/ http://nullcon.net/
Credit cards http://null.co.in/ http://nullcon.net/ Very accessible
CC deals made easy http://null.co.in/ http://nullcon.net/
Cards, burners http://null.co.in/ http://nullcon.net/
And more http://null.co.in/ http://nullcon.net/
Bad $$ => good $$ :P http://null.co.in/ http://nullcon.net/
Other  Online goods Online goods http://null.co.in/ http://nullcon.net/
Professional mass infection infection http://null.co.in/ http://nullcon.net/ <--Pricing (per 1000 installs) <--Pricing (per 1000 installs)
ICQ - elite nums :p http://null.co.in/ http://nullcon.net/
Mail cracking -:) http://null.co.in/ http://nullcon.net/ ~65USD Price in rubles
Looks familiar? http://null.co.in/ http://nullcon.net/
Passport scans http://null.co.in/ http://nullcon.net/ 4-5USD/scan avg .eu, .ru, .us, asian One-hand sales Also offered - scan “redraw” Special prices for bulk
Full package is also available http://null.co.in/ http://nullcon.net/
“Business package” Pa Includes.. Includes.. http://null.co.in/ http://nullcon.net/ Под средства любой загрязненности!  For money of any state of dirtiness В комплект входит:  Pack includes 1.Банковский акк(online доступ)  Online bank account access 2.АТМ картa(Дневной лимит на снятие средств 1000$/6000$ В МЕСЯЦ-Возможно увеличение лимита +30$-)  ATM card (1000/6000USD per month withdrawal limit) 3.Карта кодов (для online доступа)  online access passwords 4 .Копия паспорта дропа  Passport copy of “poor john” 5.Sim-ka  SIM card Also can be pre-ordered on custom passport scan (25USD)
Drop: http://null.co.in/ http://nullcon.net/ Another way to turn dirty cash into profit
Saw the news? :) http://null.co.in/ http://nullcon.net/
Zeus witchunt :) http://null.co.in/ http://nullcon.net/ Not sure if this would change things :)
New bots - custom made http://null.co.in/ http://nullcon.net/ http://www.nomina.ru/search/alternatives_by_value.php?paid_till=2010-09-06&domain=rundll32.ru
Or pre-built http://null.co.in/ http://nullcon.net/ Why “zeus” when you can buy this?! :p
Comes with handy Admin panel Admin panel http://null.co.in/ http://nullcon.net/
Traf + loader = $$$$ http://null.co.in/ http://nullcon.net/
Costs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/ Per 1000 Unique visitors
Mass domain theft theft http://null.co.in/ http://nullcon.net/
DDOS Very affordable Very affordable http://null.co.in/ http://nullcon.net/ We remove sites of your concurrents with DDOS attack. Fast and effective. Supported:  Prices (in WMZ ~= USD) Discounts for bulk
Abuse resistant hosting http://null.co.in/ http://nullcon.net/
Malware A/V QA http://null.co.in/ http://nullcon.net/
Hash cracking In cloud In cloud http://null.co.in/ http://nullcon.net/
Captcha In cloud In cloud http://null.co.in/ http://nullcon.net/
Exploit packs http://null.co.in/ http://nullcon.net/
With nice stats http://null.co.in/ http://nullcon.net/
Stats per country http://null.co.in/ http://nullcon.net/ Clicks, loads (pwned ;), percentage)
Need to build  Botnet? http://null.co.in/ http://nullcon.net/
Welcome TDS  system TDS  system http://null.co.in/ http://nullcon.net/
Seller http://null.co.in/ http://nullcon.net/
Buyer http://null.co.in/ http://nullcon.net/
Owner http://null.co.in/ http://nullcon.net/
“Game” rules :) http://null.co.in/ http://nullcon.net/ Iframe traff. 4USD/1000 clicks No bot traf (ruclicks) Payday  - every monday
Making money together http://null.co.in/ http://nullcon.net/ Fake AV affiliation program
Fake AV payouts http://null.co.in/ http://nullcon.net/ Balance Login
Crimeware: trends And research And research http://null.co.in/ http://nullcon.net/
Moving mobile ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Brief on antiy rep http://null.co.in/ http://nullcon.net/
Spreading vector http://null.co.in/ http://nullcon.net/
Mobile Malware http://null.co.in/ http://nullcon.net/
A case study ,[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Taking a glance http://null.co.in/ http://nullcon.net/
The trick! http://null.co.in/ http://nullcon.net/ Press the button “stop” as soon as possible!
SEO spam http://null.co.in/ http://nullcon.net/ <*bad* word (rus)
Now - delivered professionally :) http://null.co.in/ http://nullcon.net/
malwertising http://null.co.in/ http://nullcon.net/
Malware infection Hidden behind login screens Hidden behind login screens ,[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Anti-DDOS el russo http://null.co.in/ http://nullcon.net/
Research ,[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Hunt the hunter ,[object Object],[object Object],[object Object],[object Object],[object Object]
Botnet cost estimation :) http://null.co.in/ http://nullcon.net/
DIY botnet ;) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
How much it costs ,[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
So what’s up with russian authorities?!  :) http://null.co.in/ http://nullcon.net/
No words ;-) http://null.co.in/ http://nullcon.net/
What’s next? http://null.co.in/ http://nullcon.net/
Get some edukation :-) http://null.co.in/ http://nullcon.net/
finale ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://null.co.in/ http://nullcon.net/
Thanks! Throw your questions! ,[object Object],http://null.co.in/ http://nullcon.net/

Mais conteúdo relacionado

Semelhante a nullcon 2011 - No bullshit on underground crime: traces, trends, attribution, techniques and more

What if everything is awesome? Codemotion Madrid 2014
What if everything is awesome? Codemotion Madrid 2014What if everything is awesome? Codemotion Madrid 2014
What if everything is awesome? Codemotion Madrid 2014Christian Heilmann
 
Creating Responsive Experiences
Creating Responsive ExperiencesCreating Responsive Experiences
Creating Responsive ExperiencesTim Kadlec
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardSlawomir Jasek
 
Push the web with HTML5
Push the web with HTML5Push the web with HTML5
Push the web with HTML5Stoyan Zhekov
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasuresthaidn
 
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...PROIDEA
 
Web3 + scams = It's a match
Web3 + scams = It's a matchWeb3 + scams = It's a match
Web3 + scams = It's a matchZoltan Balazs
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity George Boobyer
 
Corncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCorncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCasey Ellis
 
nullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysis
nullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysisnullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysis
nullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysisn|u - The Open Security Community
 
Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8guest441c58b71
 
The Future of Progressive Web Apps - View Source conference, Berlin 2016
The Future of Progressive Web Apps - View Source conference, Berlin 2016The Future of Progressive Web Apps - View Source conference, Berlin 2016
The Future of Progressive Web Apps - View Source conference, Berlin 2016Robert Nyman
 
The Future of the Web - Cold Front conference 2016
The Future of the Web - Cold Front conference 2016The Future of the Web - Cold Front conference 2016
The Future of the Web - Cold Front conference 2016Robert Nyman
 
Smashingconf 150319145648-conversion-gate01
Smashingconf 150319145648-conversion-gate01Smashingconf 150319145648-conversion-gate01
Smashingconf 150319145648-conversion-gate01Home
 
Smashingconf 150319145648-conversion-gate01
Smashingconf 150319145648-conversion-gate01Smashingconf 150319145648-conversion-gate01
Smashingconf 150319145648-conversion-gate01Home
 
Welcome to planet Fintlewoodlewix - SmashingConf Oxford 2014
Welcome to planet Fintlewoodlewix - SmashingConf Oxford 2014Welcome to planet Fintlewoodlewix - SmashingConf Oxford 2014
Welcome to planet Fintlewoodlewix - SmashingConf Oxford 2014Christian Heilmann
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...Casey Ellis
 

Semelhante a nullcon 2011 - No bullshit on underground crime: traces, trends, attribution, techniques and more (20)

What if everything is awesome? Codemotion Madrid 2014
What if everything is awesome? Codemotion Madrid 2014What if everything is awesome? Codemotion Madrid 2014
What if everything is awesome? Codemotion Madrid 2014
 
Creating Responsive Experiences
Creating Responsive ExperiencesCreating Responsive Experiences
Creating Responsive Experiences
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
 
Push the web with HTML5
Push the web with HTML5Push the web with HTML5
Push the web with HTML5
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasures
 
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
 
Web3 + scams = It's a match
Web3 + scams = It's a matchWeb3 + scams = It's a match
Web3 + scams = It's a match
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
 
Encode polkadot club
Encode polkadot club  Encode polkadot club
Encode polkadot club
 
Corncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCorncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely Romance
 
A Year in the Empire
A Year in the EmpireA Year in the Empire
A Year in the Empire
 
nullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysis
nullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysisnullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysis
nullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysis
 
Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
The Future of Progressive Web Apps - View Source conference, Berlin 2016
The Future of Progressive Web Apps - View Source conference, Berlin 2016The Future of Progressive Web Apps - View Source conference, Berlin 2016
The Future of Progressive Web Apps - View Source conference, Berlin 2016
 
The Future of the Web - Cold Front conference 2016
The Future of the Web - Cold Front conference 2016The Future of the Web - Cold Front conference 2016
The Future of the Web - Cold Front conference 2016
 
Smashingconf 150319145648-conversion-gate01
Smashingconf 150319145648-conversion-gate01Smashingconf 150319145648-conversion-gate01
Smashingconf 150319145648-conversion-gate01
 
Smashingconf 150319145648-conversion-gate01
Smashingconf 150319145648-conversion-gate01Smashingconf 150319145648-conversion-gate01
Smashingconf 150319145648-conversion-gate01
 
Welcome to planet Fintlewoodlewix - SmashingConf Oxford 2014
Welcome to planet Fintlewoodlewix - SmashingConf Oxford 2014Welcome to planet Fintlewoodlewix - SmashingConf Oxford 2014
Welcome to planet Fintlewoodlewix - SmashingConf Oxford 2014
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
 

Mais de n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mais de n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

nullcon 2011 - No bullshit on underground crime: traces, trends, attribution, techniques and more