SlideShare uma empresa Scribd logo
1 de 229
Visiting The Bear Den
A Journey in the Land of (Cyber-)Espionage
Joan Calvet
Jessy Campos
Thomas Dupuy
1
Sednit Group
• Also know as APT28, Fancy Bear, Sofacy,
STRONTIUM, Tsar Team
• Group of attackers doing targeted attacks
since 2006
• Mainly interested into geopolitics
2
3
Plan
• Context
• The Week Serge Met The Bear
• The Mysterious DOWNDELPH
• Speculative Mumblings
CONTEXT
What kind of group is Sednit?
4
Who Is The Bear After? (1)
• We found a list of targets for Sednit
phishing campaigns:
– Operators used Bitly and “forgot” to set the
profile private
(feature now removed from Bitly)
– Around 4,000 shortened URLs during 6
months in 2015
5
6
http://login.accoounts-google.com/url/?continue=
cGFyZXBreWl2QGdtYWlsLmNvbQ==&df=UGFraXN0
YW4rRW1iYXNzeStLeWl2&tel=1
Who Is The Bear After? (2)
6
http://login.accoounts-google.com/url/?continue=
cGFyZXBreWl2QGdtYWlsLmNvbQ==&df=UGFraXN0
YW4rRW1iYXNzeStLeWl2&tel=1
Who Is The Bear After? (2)
parepkyiv@gmail.com
6
http://login.accoounts-google.com/url/?continue=
cGFyZXBreWl2QGdtYWlsLmNvbQ==&df=UGFraXN0
YW4rRW1iYXNzeStLeWl2&tel=1
Who Is The Bear After? (2)
parepkyiv@gmail.com
Pakistan+Embassy+Kyiv
6
http://login.accoounts-google.com/url/?continue=
cGFyZXBreWl2QGdtYWlsLmNvbQ==&df=UGFraXN0
YW4rRW1iYXNzeStLeWl2&tel=1
Who Is The Bear After? (2)
parepkyiv@gmail.com
Pakistan+Embassy+Kyiv
Who Is The Bear After? (3)
• Embassies and ministries of more than 40 countries
• NATO and EU institutions
• “Who’s who” of individuals involved in Eastern Europe
politics:
– Politicians
– Activists
– Journalists
– Academics
– Militaries
– …
7
The Bear Has Money
• A bag full of 0-day exploits:
8
2015
Apr May Jun Jul Aug Sep Oct
CVE-2015-3043 (Flash)
CVE-2015-1701 (Windows LPE)
CVE-2015-2590 (Java)
CVE-2015-4902 (Java click-to-play bypass)
CVE-2015-7645
(Flash)
CVE-2015-2424 (Office RCE)
The Bear Can Code
• Tens of custom-made software used since 2006:
– Droppers
– Downloaders
– Reconnaissance tools
– Long-term spying backdoors
– Encryption proxy tool
– USB C&C channel
– Many helper tools
– …
9
Disclaimers
• Over the last two years we tracked Sednit closely,
but of course our visibility is not exhaustive
• How do we know it is ONE group?
– We don’t
– Our Sednit “definition” is based on their toolkit and the
related infrastructure
• We do not do attribution (but we point out hints that may
be used for that)
10
THE WEEK SERGE MET THE BEAR
11
Who Is Serge?
• Code name for an imaginary Sednit target
• Serge is a government employee with access to
sensitive information
• The chain of events in Serge’s attack matches
several real cases we investigated
• We use it as a textbook case to present (a part of)
the Sednit toolkit
12
13
Monday, 9:30AM
Serge Opens an Email
14
Legitimate URL Mimicking
15
Legitimate URL Mimicking
15
Legitimate URL Mimicking
15
Legitimate URL Mimicking
15
16
Serge clicks on the URL, and…
…Serge Meets SEDKIT
• Exploit-kit for targeted attacks
• Entry-point URLs mimic legitimate URLs
• Usually propagated by targeted phishing emails
(also seen with hacked website + iframe)
• Period of activity: September 2014 - Now
17
Landing Page (1)
Reconnaissance Report Building
18
Landing Page (1)
Reconnaissance Report Building
18
Landing Page (1)
Reconnaissance Report Building
18
19
Crawling Sedkit
20
21
Serge is selected to be
exploited…
… and Visits Sednit Exploits Factory
Vulnerability Targeted Application Note
CVE-2013-1347 Internet Explorer 8
CVE-2013-3897 Internet Explorer 8
CVE-2014-1510 +
CVE-2014-1511
Firefox
CVE-2014-1776 Internet Explorer 11
CVE-2014-6332 Internet Explorer Several versions
N/A MacKeeper
CVE-2015-2590 +
CVE-2015-4902
Java 0-day*
CVE-2015-3043 Adobe Flash 0-day*
CVE-2015-5119 Adobe Flash Hacking Team gift
CVE-2015-7645 Adobe Flash 0-day*
22
* : At the time SEDKIT dropped them
… and Visits Sednit Exploits Factory
Vulnerability Targeted Application Note
CVE-2013-1347 Internet Explorer 8
CVE-2013-3897 Internet Explorer 8
CVE-2014-1510 +
CVE-2014-1511
Firefox
CVE-2014-1776 Internet Explorer 11
CVE-2014-6332 Internet Explorer Several versions
N/A MacKeeper
CVE-2015-2590 +
CVE-2015-4902
Java 0-day*
CVE-2015-3043 Adobe Flash 0-day*
CVE-2015-5119 Adobe Flash Hacking Team gift
CVE-2015-7645 Adobe Flash 0-day*
23
* : At the time SEDKIT dropped them
… and Visits Sednit Exploits Factory
Vulnerability Targeted Application Note
CVE-2013-1347 Internet Explorer 8
CVE-2013-3897 Internet Explorer 8
CVE-2014-1510 +
CVE-2014-1511
Firefox
CVE-2014-1776 Internet Explorer 11
CVE-2014-6332 Internet Explorer Several versions
N/A MacKeeper
CVE-2015-2590 +
CVE-2015-4902
Java 0-day*
CVE-2015-3043 Adobe Flash 0-day*
CVE-2015-5119 Adobe Flash Hacking Team gift
CVE-2015-7645 Adobe Flash 0-day*
24
* : At the time SEDKIT dropped them
… and Visits Sednit Exploits Factory
Vulnerability Targeted Application Note
CVE-2013-1347 Internet Explorer 8
CVE-2013-3897 Internet Explorer 8
CVE-2014-1510 +
CVE-2014-1511
Firefox
CVE-2014-1776 Internet Explorer 11
CVE-2014-6332 Internet Explorer Several versions
N/A MacKeeper
CVE-2015-2590 +
CVE-2015-4902
Java 0-day*
CVE-2015-3043 Adobe Flash 0-day*
CVE-2015-5119 Adobe Flash Hacking Team gift
CVE-2015-7645 Adobe Flash 0-day*
25
* : At the time SEDKIT dropped them
Revamping CVE-2014-6332
(a.k.a. IE “Unicorn bug”)
• October 2015:
– Re-use of public PoC to disable VBScript “SafeMode”
– Next stage binary downloaded by PowerShell
26
Revamping CVE-2014-6332
(a.k.a. IE “Unicorn bug”)
• October 2015:
– Re-use of public PoC to disable VBScript “SafeMode”
– Next stage binary downloaded by PowerShell
• February 2016:
– No more “SafeMode” disabling, direct ROP-based
shellcode execution
– Around 400 lines of VBScript, mostly custom
27
28
29
VBScript Framework
• Functions:
– addToROP()
– getROPstringAddress ()
– Code_section_explorer_7 ()
– Code_section_explorer_XP()
– getNeddedAddresses ()
– addrToHex ()
– …
30
VBScript Framework
• Functions:
– addToROP()
– getROPstringAddress ()
– Code_section_explorer_7 ()
– Code_section_explorer_XP()
– getNeddedAddresses ()
– addrToHex ()
– …
Have you ever seen this somewhere?
(cuz we don’t)
30
31
Exploit downloads a payload
and…
Serge Meets SEDUPLOADER
(a.k.a. JHUHUGIT, JKEYSKW)
• Downloaded by SEDKIT
• Two binaries: the dropper and its embedded
payload
• Deployed as a first-stage component
• Period of activity: March 2015 - Now
SEDUPLOADER DROPPER
Workflow
Anti-
Analysis
Payload
Dropping
Escalating
Privileges
Payload
Persistence
SEDUPLOADER DROPPER
Workflow
Anti-
Analysis
Payload
Dropping
Escalating
Privileges
Payload
Persistence
SEDUPLOADER DROPPER
Workflow
Anti-
Analysis
Payload
Dropping
Escalating
Privileges
Payload
Persistence
SEDUPLOADER DROPPER
Workflow
Anti-
Analysis
Payload
Dropping
Escalating
Privileges
Payload
Persistence
• CVE-2015-1701 (0-day)
• CVE-2015-2387 ( )
SEDUPLOADER DROPPER
Workflow
Anti-
Analysis
Payload
Dropping
Escalating
Privileges
Payload
Persistence
• Windows COM object hijacking
• Shell Icon Overlay COM object
• Registry key UserInitMprLogonScript
• JavaScript code executed within rundll32.exe
• Scheduled tasks, Windows service,…
SEDUPLOADER DROPPER
Workflow
Anti-
Analysis
Payload
Dropping
Escalating
Privileges
Payload
Persistence
• Windows COM object hijacking
• Shell Icon Overlay COM object
• Registry key UserInitMprLogonScript
• JavaScript code executed within rundll32.exe
• Scheduled tasks, Windows service,…
SEDUPLOADER DROPPER
Workflow
Anti-
Analysis
Payload
Dropping
Escalating
Privileges
Payload
Persistence
• Windows COM object hijacking Win32/COMpfun
• Shell Icon Overlay COM object
• Registry key UserInitMprLogonScript
• JavaScript code executed within rundll32.exe Win32/Poweliks
• Scheduled tasks, Windows service,…
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
Direct
Connection
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
Direct
Connection
C&C
Successfully
Contacted
SUCCESS
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
Direct
Connection
Via Proxy
C&C
Successfully
Contacted
FAIL
SUCCESS
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
Direct
Connection
Via Proxy
C&C
Successfully
Contacted
FAIL
SUCCESS
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
Direct
Connection
Via Proxy
Inject Into
Browsers
C&C
Successfully
Contacted
FAIL
SUCCESS
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
Direct
Connection
Via Proxy
Inject Into
Browsers
C&C
Successfully
Contacted
FAIL
SUCCESS
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
SEDUPLOADER PAYLOAD
Workflow
Network Link
Establishment
First Stage
Report
Parsing C&C
Orders
East Side Story
printf debugging
46
Serge opens an email
leading to SEDKIT, and then
SEDUPLOADER
9:30AM
Chain of Events
Mon Tue Wed Thu Fri
47
Monday, 10:00AM
…Serge meets SEDRECO
• Downloaded by SEDUPLOADER
• Backdoor with the ability to load external
plugins
• Usually deployed as a second stage backdoor
to spy on the infected computer
• Period of activity : 2012 - Now
48
Dropper
• Drops encrypted configuration
– In a file (“msd”)
– In the Windows Registry
• No configuration linked to the payload
Configuration Overview
Configuration Overview
XOR KEY
Configuration Overview
XOR KEY FIELD SIZES
Configuration Overview (Decrypted)
Configuration Overview (Decrypted)
('600000', '600000', ‘SERGE-PC…', 'kenlynton.com',
'softwaresupportsv.com', 'mtcf', '10000', '600000', '1',
'updmanager.com', '', '', '', '', '', '', '', '', '', '')
Configuration Overview (Decrypted)
('600000', '600000', ‘SERGE-PC…', 'kenlynton.com',
'softwaresupportsv.com', 'mtcf', '10000', '600000', '1',
'updmanager.com', '', '', '', '', '', '', '', '', '', '')
Various timeouts
Configuration Overview (Decrypted)
('600000', '600000', ‘SERGE-PC…', 'kenlynton.com',
'softwaresupportsv.com', 'mtcf', '10000', '600000', '1',
'updmanager.com', '', '', '', '', '', '', '', '', '', '')
Computer name
Configuration Overview (Decrypted)
('600000', '600000', ‘SERGE-PC…', 'kenlynton.com',
'softwaresupportsv.com', 'mtcf', '10000', '600000', '1',
'updmanager.com', '', '', '', '', '', '', '', '', '', '')
Keylogger enabled
Configuration Overview (Decrypted)
('600000', '600000', ‘SERGE-PC…', 'kenlynton.com',
'softwaresupportsv.com', 'mtcf', '10000', '600000', '1',
'updmanager.com', '', '', '', '', '', '', '', '', '', '')
C&C servers
Configuration Overview (Decrypted)
('600000', '600000', ‘SERGE-PC…', 'kenlynton.com',
'softwaresupportsv.com', 'mtcf', '10000', '600000', '1',
'updmanager.com', '', '', '', '', '', '', '', '', '', '')
Operation name
(rhst, rhbp, mctf, mtqs)
Configuration Overview (Decrypted)
('600000', '600000', ‘SERGE-PC…', 'kenlynton.com',
'softwaresupportsv.com', 'mtcf', '10000', '600000', '1',
'updmanager.com', '', '', '', '', '', '', '', '', '', '')
Plugins list
Payload
Payload
Payload
Payload
Payload
Payload
Payload
Payload
Payload
Extending The Core (1)
• Plugins are DLLs loaded in the same address
space
• Plugins receive arguments from the core:
Extending The Core (1)
• Plugins are DLLs loaded in the same address
space
• Plugins receive arguments from the core:
Extending The Core (1)
• Plugins are DLLs loaded in the same address
space
• Plugins receive arguments from the core:
Extending The Core (2)
Extending The Core (2)
New command
55
Serge opens an email
leading to SEDKIT, and then
SEDUPLOADER
9:30AM
SEDRECO deployment
10:00AM
Chain of Events
Mon Tue Wed Thu Fri
56
Monday, 2:00PM
Serge Meets XAGENT
(a.k.a SPLM, CHOPSTICK)
• Downloaded by SEDUPLOADER
• Modular backdoor developed in C++ with Windows,
Linux and iOS versions
• Deployed in most Sednit operations, usually after the
reconnaissance phase
• Period of activity: November 2012 - Now
57
58
59
• Linux XAGENT, compiled in July 2015
59
• Linux XAGENT, compiled in July 2015
• ~ 18,000 lines of code in 59 classes
59
• Linux XAGENT, compiled in July 2015
• ~ 18,000 lines of code in 59 classes
• Derives from Windows version:
59
• Linux XAGENT, compiled in July 2015
• ~ 18,000 lines of code in 59 classes
• Derives from Windows version:
• XAGENT major version 2, but matches the
logic of currently distributed binaries
(version 3)
59
Such Comments
60
<- That’s a lot
61
main.cpp
61
main.cpp
61
main.cpp
61
main.cpp
61
main.cpp
61
main.cpp
62
Translates messages
from modules for
the C&C server
Translates messages
from the C&C
server for modules
AgentKernel::run()
AgentKernel
RemoteShell
FSModule
Keylogger
Channel
Controller
Modules
C&C
SERVER
Unencrypted messages
Encrypted messages
Communication Workflow
XAGENT INFECTED COMPUTER
62
Translates messages
from modules for
the C&C server
Translates messages
from the C&C
server for modules
AgentKernel::run()
AgentKernel
RemoteShell
FSModule
Keylogger
Channel
Controller
Modules
C&C
SERVER
Unencrypted messages
Encrypted messages
Communication Workflow
XAGENT INFECTED COMPUTER
62
Translates messages
from modules for
the C&C server
Translates messages
from the C&C
server for modules
AgentKernel::run()
AgentKernel
RemoteShell
FSModule
Keylogger
Channel
Controller
Modules
C&C
SERVER
Unencrypted messages
Encrypted messages
Communication Workflow
XAGENT INFECTED COMPUTER
62
Translates messages
from modules for
the C&C server
Translates messages
from the C&C
server for modules
AgentKernel::run()
AgentKernel
RemoteShell
FSModule
Keylogger
Channel
Controller
Modules
C&C
SERVER
Unencrypted messages
Encrypted messages
Communication Workflow
XAGENT INFECTED COMPUTER
62
Translates messages
from modules for
the C&C server
Translates messages
from the C&C
server for modules
AgentKernel::run()
AgentKernel
RemoteShell
FSModule
Keylogger
Channel
Controller
Modules
C&C
SERVER
Unencrypted messages
Encrypted messages
Communication Workflow
XAGENT INFECTED COMPUTER
62
Translates messages
from modules for
the C&C server
Translates messages
from the C&C
server for modules
AgentKernel::run()
AgentKernel
RemoteShell
FSModule
Keylogger
Channel
Controller
Modules
C&C
SERVER
Unencrypted messages
Encrypted messages
Communication Workflow
XAGENT INFECTED COMPUTER
62
Translates messages
from modules for
the C&C server
Translates messages
from the C&C
server for modules
AgentKernel::run()
AgentKernel
RemoteShell
FSModule
Keylogger
Channel
Controller
Modules
C&C
SERVER
Unencrypted messages
Encrypted messages
Communication Workflow
XAGENT INFECTED COMPUTER
62
Translates messages
from modules for
the C&C server
Translates messages
from the C&C
server for modules
AgentKernel::run()
AgentKernel
RemoteShell
FSModule
Keylogger
Channel
Controller
Modules
C&C
SERVER
Unencrypted messages
Encrypted messages
Channel
(HTTP or emails)
Communication Workflow
XAGENT INFECTED COMPUTER
Emails Channel (1)
Workflow
63
exfil@gmail.com
orders@gmail.comXAGENT INFECTED
COMPUTER
USING MailChannel
C&C SERVER
Emails Channel (1)
Workflow
63
exfil@gmail.com
orders@gmail.comXAGENT INFECTED
COMPUTER
USING MailChannel
SMTPS
C&C SERVER
Emails Channel (1)
Workflow
63
exfil@gmail.com
orders@gmail.comXAGENT INFECTED
COMPUTER
USING MailChannel
SMTPS POP3S
C&C SERVER
Emails Channel (1)
Workflow
63
exfil@gmail.com
orders@gmail.comXAGENT INFECTED
COMPUTER
USING MailChannel
SMTPS POP3S
SMTPS
C&C SERVER
Emails Channel (1)
Workflow
63
exfil@gmail.com
orders@gmail.comXAGENT INFECTED
COMPUTER
USING MailChannel
SMTPS
POP3S
POP3S
SMTPS
C&C SERVER
Emails Channel (1)
Workflow
63
exfil@gmail.com
orders@gmail.comXAGENT INFECTED
COMPUTER
USING MailChannel
SMTPS
POP3S
POP3S
SMTPS
C&C SERVER
An email-based C&C protocol needs to provide:
1. A way to distinguish C&C emails from unrelated emails
2. A way to bypass spam filters
Email Channel (2)
P2Scheme, a.k.a “Level 2 Protocol”
64
Email Channel (2)
P2Scheme, a.k.a “Level 2 Protocol”
64
KEY SUBJ_TOKEN ^ KEY XAGENT_ID ^ KEY
base64
0 5 12 16
Email Channel (2)
P2Scheme, a.k.a “Level 2 Protocol”
64
KEY SUBJ_TOKEN ^ KEY XAGENT_ID ^ KEY
base64
0 5 12 16
Email Channel (3)
Georgian Protocol
65
Email Channel (3)
Georgian Protocol
65
Georgian national ID number
Email Channel (3)
Georgian Protocol
65
Georgian national ID number
“Hello”
Email Channel (3)
Georgian Protocol
65
Georgian national ID number
“Hello”
“detailed” + timestamp
Bonus: XAGENT C&C Infrastructure
66
Bonus: XAGENT C&C Infrastructure
66
Thank you, Google search engine
XAGENT Proxy Server
• Python code used between April and June
2015
XAGENT Proxy Server
• Python code used between April and June
2015
• ~ 12,200 lines of code
XAGENT Proxy Server
• Python code used between April and June
2015
• ~ 12,200 lines of code
• Translates email protocol from XAGENT
into a HTTP protocol for the C&C server:
(over HTTP)
P3Protocol
XAGENT PROXY BACKEND
C&C SERVER
INBOX
P2Protocol
68
Serge opens an email
leading to SEDKIT, and then
SEDUPLOADER
9:30AM
SEDRECO deployment
10:00AM
XAGENT deployment
02:00PM
Chain of Events
Mon Tue Wed Thu Fri
69
Next three days…
Serge Meets
Passwords Extractors
• SecurityXploded tools (grand classic of Sednit)
– Cons: usually detected by AV software
• Custom tools, in particular a Windows Live
Mail passwords extractor compiled for Serge:
70
Serge Meets
Windows Passwords Extractors
• From registry hives
– Deployed with LPE for CVE-2014-4076
• Good ol’ Mimikatz (“pi.log”)
– Deployed with LPE for CVE-2015-1701
71
Serge Meets Screenshoter
• Custom tool to take screenshots each time the
mouse moves
72
And… Serge Meets XTUNNEL
• Network proxy tool to contact machines
normally unreachable from Internet
• Period of activity: May 2013 - Now
73
74
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
INTERNET
INTERNAL
NETWORK
C&C SERVER
Initial
Situation
75
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
Encryption
Handshake
C&C SERVER
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
75
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
D5 47 A4 A4.3F 60 6A 0F
3B 36 04 1C.44 4A C8 BD
80 BE 7B 25.8E E6 FC F2
CD 5D 7F 3A.73 1D 59 A5
2D 35 77 F3.B2 1B DF 7D
EE 1D 1C F1.AB 91 87 87
…
Encryption
Handshake
D5 47 A4 A4.3F 60 6A 0F
3B 36 04 1C.44 4A C8 BD
80 BE 7B 25.8E E6 FC F2
CD 5D 7F 3A.73 1D 59 A5
2D 35 77 F3.B2 1B DF 7D
EE 1D 1C F1.AB 91 87 87
…
T
T
C&C SERVER
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
75
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
D5 47 A4 A4.3F 60 6A 0F
3B 36 04 1C.44 4A C8 BD
80 BE 7B 25.8E E6 FC F2
CD 5D 7F 3A.73 1D 59 A5
2D 35 77 F3.B2 1B DF 7D
EE 1D 1C F1.AB 91 87 87
…
Encryption
Handshake
D5 47 A4 A4.3F 60 6A 0F
3B 36 04 1C.44 4A C8 BD
80 BE 7B 25.8E E6 FC F2
CD 5D 7F 3A.73 1D 59 A5
2D 35 77 F3.B2 1B DF 7D
EE 1D 1C F1.AB 91 87 87
…
T
T
RC4 key
O
C&C SERVER
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
75
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
D5 47 A4 A4.3F 60 6A 0F
3B 36 04 1C.44 4A C8 BD
80 BE 7B 25.8E E6 FC F2
CD 5D 7F 3A.73 1D 59 A5
2D 35 77 F3.B2 1B DF 7D
EE 1D 1C F1.AB 91 87 87
…
Encryption
Handshake
D5 47 A4 A4.3F 60 6A 0F
3B 36 04 1C.44 4A C8 BD
80 BE 7B 25.8E E6 FC F2
CD 5D 7F 3A.73 1D 59 A5
2D 35 77 F3.B2 1B DF 7D
EE 1D 1C F1.AB 91 87 87
…
T
T
 Offset O in T
 Proof of knowledge of T
RC4 key
O
C&C SERVER
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
76
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
D5 47 A4 A4.3F 60 6A 0F
3B 36 04 1C.44 4A C8 BD
80 BE 7B 25.8E E6 FC F2
CD 5D 7F 3A.73 1D 59 A5
2D 35 77 F3.B2 1B DF 7D
EE 1D 1C F1.AB 91 87 87
…
Encryption
Handshake
D5 47 A4 A4.3F 60 6A 0F
3B 36 04 1C.44 4A C8 BD
80 BE 7B 25.8E E6 FC F2
CD 5D 7F 3A.73 1D 59 A5
2D 35 77 F3.B2 1B DF 7D
EE 1D 1C F1.AB 91 87 87
…
T
T
“OK”
RC4 key
RC4 Key
O
O
C&C SERVER
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
77
C&C SERVER
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
Encryption
Handshake
RC4-encrypted link
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
78
C&C SERVER
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
Encryption
Handshake
TLS encapsulation
(added in 2014)
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
79
C&C SERVER
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
Tunnels
Opening
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
79
C&C SERVER
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
Tunnels
Opening
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
79
C&C SERVER
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
Tunnels
Opening
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
Any kind of TCP-based
traffic can be tunneled!
(PsExec)
79
C&C SERVER
SERGE’S
COMPUTER
(XTUNNEL
INFECTED)
INTERNET
INTERNAL
NETWORK
Tunnels
Opening
COMPUTER A
(CLEAN)
COMPUTER B
(CLEAN)
Any kind of TCP-based
traffic can be tunneled!
(PsExec)
Code Obfuscation (1)
• Starting in July 2015 XTUNNEL code was
obfuscated
(which is two months after the Sednit attack against
the German parliament, where XTUNNEL was used)
80
Code Obfuscation (1)
• Starting in July 2015 XTUNNEL code was
obfuscated
(which is two months after the Sednit attack against
the German parliament, where XTUNNEL was used)
• The obfuscation is a mix of classic syntactic
techniques, like insertion of junk code and
opaque predicates
80
Code Obfuscation (2)
BEFORE AFTER
81
Code Obfuscation (2)
BEFORE AFTER
81
Good toy example for automatic
desobfuscation magic?
82
Serge opens an email
leading to SEDKIT, and then
SEDUPLOADER
9:30AM
SEDRECO deployment
10:00AM
XAGENT deployment
02:00PM
Information
exfiltration and
lateral movements
Chain of Events
Mon Tue Wed Thu Fri
83
Friday, 11:00AM
Long Term Persistence (1)
• Special XAGENT copied in Office folder under
the name “msi.dll”
84
Long Term Persistence (2)
• system32msi.dll is a legitimate Windows
DLL needed by Office applications
85
Long Term Persistence (2)
• system32msi.dll is a legitimate Windows
DLL needed by Office applications
• XAGENT msi.dll exports the same function
names as the legitimate msi.dll:
85
Long Term Persistence (3)
• Each time Serge starts Office, XAGENT
msi.dll is loaded (search-order hijacking):
– Loads real msi.dll from system32
– Fills its export table with the addresses of the real
msi.dll functions
– Starts XAGENT malicious logic
86
Long Term Persistence (3)
• Each time Serge starts Office, XAGENT
msi.dll is loaded (search-order hijacking):
– Loads real msi.dll from system32
– Fills its export table with the addresses of the real
msi.dll functions
– Starts XAGENT malicious logic
• Same technique also seen with
LINKINFO.dll dropped in C:WINDOWS
86
87
Serge opens an email
leading to SEDKIT, and then
SEDUPLOADER
9:30AM
SEDRECO deployment
10:00AM
XAGENT deployment
02:00PM
Long-term
persistence
method
deployment
11:00AM
Chain of Events
Mon Tue Wed Thu Fri
Information
exfiltration and
lateral movements
THE MYSTERIOUS DOWNDELPH
What the hell is going on here ?!
88
Discovery
September 2015
• Classic Sednit dropper
• Shows a decoy document
What Is In This Dropper?
The Ultimate Boring Component
• Delphi downloader, we named it DOWNDELPH
(slow clap)
• Simple workflow:
– Downloads a config (.INI file)
– Based on the config, downloads a payload
– Executes payload
• Persistence method: Run registry key
The Ultimate Boring Component
• Delphi downloader, we named it DOWNDELPH
(slow clap)
• Simple workflow:
– Downloads a config (.INI file)
– Based on the config, downloads a payload
– Executes payload
• Persistence method: Run registry key
Let The Hunt Begins
2013 DOWNDELPH Sample
Dropper
Helper Bootkit Installer DOWNDELPH
Let The Hunt Begins
2013 DOWNDELPH Sample
Dropper
Helper Bootkit Installer DOWNDELPH
• Infects BIOS-based systems
• Tested on Windows XP/7, 32bit/64bit
• Never been documented
Not So Boring Component
Bootkit Installation
MBR Legitimate data
First sectors before infection
1ST sector
Malicious
MBR
Original MBR
(1-byte XOR)
Hooks
(1-byte XOR)
Driver
(1-byte XOR + RC4)
Legitimate Data
First sectors before infection First sectors after infection
Bootkit Installation
1ST sector 2ND sector
Normal Boot Process
Windows 7 x64
BOOTMGR Winload.exe
…
Real Mode
Protected Mode
Original MBR
Kernel Init
Infected Boot Process
Windows 7 x64
Infected MBR BOOTMGR Winload.exe
Real Mode
Protected Mode
Original MBR
… Kernel Init
Infected Boot Process
Windows 7 x64
Infected MBR BOOTMGR Winload.exe
Real Mode
Protected Mode
Original MBR
… Kernel Init
Malicious MBR
• Hooks INT 13h handler (low-level read/write
operations)
Malicious MBR
• Hooks INT 13h handler (low-level read/write
operations)
• Patches BOOTMGR in memory
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
Real Mode
Protected Mode
Original MBR
… Kernel Init
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
Real Mode
Protected Mode
Original MBR
Hook
… Kernel Init
BOOTMGR Hook
• Searches OslArchTransferToKernel() in
winload.exe to patch it
kd> u winload!OslArchTransferToKernel
winload!OslArchTransferToKernel:
00000000`003381f0 e961fdd5ff jmp 00000000`00097f56
Before:
After:
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
Real Mode
Protected Mode
Original MBR
Hook
… Kernel Init
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
Real Mode
Protected Mode
Original MBR
Hook Hook
… Kernel Init
Winload.exe Hook
• Locates MmMapIoSpace
• Saves some code in ACPI.sys resources section
(and makes the section executable)
• Hooks ACPI!GsDriverEntry
Saving Important Information
ACPI!GsDriverEntry original
opcodes
0: kd> db rbx $$ kernel header address
4d 5a 90 00 03 00 00 00-04 00 00 00 ff ff 00 00 MZ..............
b8 00 00 00 00 00 00 00-40 00 00 00 00 00 00 00 ........@.......
00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00-00 00 00 00 f8 00 00 00 ................
00 74 09 00 00 b4 09 cd-21 b8 01 4c cd 21 54 68 .t......!..L.!Th
69 73 20 70 72 6f 67 72-61 6d 20 63 61 6e 6e 6f is program canno
74 20 62 65 20 72 75 6e-20 69 6e 20 44 4f 53 20 t be run in DOS
6d 6f 64 65 2e 0d 0d 0a-24 00 00 00 00 00 00 00 mode....$.......
8a 4a 9e 90 ce 2b f0 c3-ce 2b f0 c3 ce 2b f0 c3 .J...+...+...+..
c7 53 73 c3 aa 2b f0 c3-c7 53 63 c3 c5 2b f0 c3 .Ss..+...Sc..+..
ce 2b f1 c3 a2 2b c0 97-8f 00 00 f8 ff ff 30 fc .+...+........0.
04 00 f2 0f 00 00 48 83-ec 28 4c c3 d4 2b f0 c3 ......H..(L..+..
c7 53 62 c3 cf 2b f0 c3-c7 53 64 c3 cf 2b f0 c3 .Sb..+...Sd..+..
c7 53 61 c3 20 cd a2 02-00 f8 ff ff ce 2b f0 c3 .Sa. ........+..
00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00-50 45 00 00 64 86 18 00 ........PE..d...
Bootkit physical address
MmMapIoSpace address
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
ACPI.sys
Real Mode
Protected Mode
Original MBR
Kernel Init
Hook Hook
…
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
ACPI.sys
Real Mode
Protected Mode
Original MBR
Kernel Init
Hook Hook
Hook
…
ACPI.sys Hook
• Restores ACPI!GsDriverEntry
• Maps the bootkit physical address into virtual
address space by calling MmMapIoSpace
• Decrypts hidden driver
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
ACPI.sys
Bootkit Driver
“Bootkit
user-mode
component”
DOWNDELPH
Real Mode
Protected Mode
Original MBR
Kernel Init
Hook Hook
Hook
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
ACPI.sys
Bootkit Driver
“Bootkit
user-mode
component”
DOWNDELPH
Real Mode
Protected Mode
Original MBR
Kernel Init
Hook Hook
Hook
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
ACPI.sys
Bootkit Driver
“Bootkit
user-mode
component”
DOWNDELPH
Real Mode
Protected Mode
Original MBR
Kernel Init
Hook Hook
Hook
Bootkit Workflow
Infected MBR BOOTMGR Winload.exe
ACPI.sys
Bootkit Driver
“Bootkit
user-mode
component”
DOWNDELPH
Real Mode
Protected Mode
Original MBR
Kernel Init
Hook Hook
Hook
Why a DLL to load another DLL ?
Who Are You Bootkit?
• Missing exported variable in DOWNDELPH
Who Are You Bootkit?
• Missing exported variable in DOWNDELPH
• Code sharing with BlackEnergy
– Relocations fixing
– DLL injection calling three exports (“Entry”,
“ep_data” and “Dummy”)
– …
But It’s Not The End of The Story
2014 DOWNDELPH Samples
Dropper
Helper
Kernel Mode
Rootkit
DOWNDELPH
Not So Boring Component++
Kernel Mode Rootkit (1)
• Registered as a Windows service
• Injects DOWNDELPH into explorer.exe (APC)
• Hides files, folders and registry keys
• Relies on a set of rules:
HIDEDRV: >>>>>>>>Hide rules>>>>>>>> rules
HIDEDRV: File rules: Device[…]dnscli1.dll
HIDEDRV: File rules: Device[…]FsFlt.sys
HIDEDRV: Registry rules: REGISTRY[…]FsFlt
HIDEDRV: Registry rules: REGISTRY[…]FsFlt
HIDEDRV: Registry rules: REGISTRY[…]FsFlt
HIDEDRV: Inject dll: C:Windowssystem32mypathcomdnscli1.dll
HIDEDRV: Folder rules: DeviceHarddiskVolume1Windowssystem32mypathcom
HIDEDRV: <<<<<<<<XXXXX<<<<<<<< rules
HIDEDRV: <<<<<<<<Hide rules<<<<<<<< rules
Kernel Mode Rootkit (2)
How It Works
• Two implementations of the hiding ability:
– SSDT hooking
– Minifilter driver
Implementation Minifilter
Implementation Minifilter
Implementation Minifilter
Implementation Minifilter
Who Are You Rootkit?
• Never documented (to the best of our
knowledge)
• PDB paths:
d:!worketchiBinDebugwin7x86fsflt.pdb
d:!worketchideinstaller_kis2013BinDebugwin7x64fsflt.pdb
d:newhideinstallerBinDebugwxpx86fsflt.pdb
Who Are You Rootkit?
• Never documented (to the best of our
knowledge)
• PDB paths:
d:!worketchiBinDebugwin7x86fsflt.pdb
d:!worketchideinstaller_kis2013BinDebugwin7x64fsflt.pdb
d:newhideinstallerBinDebugwxpx86fsflt.pdb
Who Are You Rootkit?
• Never documented (to the best of our
knowledge)
• PDB paths:
d:!worketchiBinDebugwin7x86fsflt.pdb
d:!worketchideinstaller_kis2013BinDebugwin7x64fsflt.pdb
d:newhideinstallerBinDebugwxpx86fsflt.pdb
To Summarize
• Seven different samples (!) of DOWNDELPH over
the past three years
• One C&C server was up for two years
• Persistence methods:
– Bootkit able to infect from Windows XP to Windows 7
– Rootkit
• So, WHY such advanced persistence methods for
such a simple component?
• DOWNDELPH downloaded SEDRECO + XAGENT in
a few cases, so SEDNIT related for sure
SPECULATIVE MUMBLINGS
116
Call For Speculation
• The diversity of Sednit software is impressive
(DOWNDELPH, bootkit, XAGENT, SEDKIT…)
• Diversity is good for their operations, as it
makes detection and tracking harder
• How did they created this software
ecosystem?
117
Sednit Development Process (1)
Developers Role
• Binaries are often compiled specifically for a
target, after it has been infected
118
XAGENT SMTP logins/passwords
Sednit Development Process (1)
Developers Role
• Binaries are often compiled specifically for a
target, after it has been infected
• Main software evolve regularly (XTUNNEL,
SEDUPLOADER, XAGENT…)
118
XAGENT SMTP logins/passwords
Sednit Development Process (1)
Developers Role
• Binaries are often compiled specifically for a
target, after it has been infected
• Main software evolve regularly (XTUNNEL,
SEDUPLOADER, XAGENT…)
118
Developers are part of the team,
not outsiders paid for a one-time job
XAGENT SMTP logins/passwords
Sednit Development Process (2)
Software Design
• Different Sednit software share some
techniques:
– RC4 keys built as concatenation of a hardcoded
value and a randomly generated value
(XAGENT, DOWNDELPH, SEDUPLOADER)
– Hardcoded “tokens” in network messages
(XAGENT, SEDUPLOADER, SEDRECO)
119
Sednit Development Process (2)
Software Design
• Different Sednit software share some
techniques:
– RC4 keys built as concatenation of a hardcoded
value and a randomly generated value
(XAGENT, DOWNDELPH, SEDUPLOADER)
– Hardcoded “tokens” in network messages
(XAGENT, SEDUPLOADER, SEDRECO)
119
The same developers may be
behind this variety of software
Sednit Development Process (3)
Programming Errors
120
Linux XAGENT
Communications termination
Sednit Development Process (3)
Programming Errors
120
Linux XAGENT
Communications termination
Sednit Development Process (3)
Programming Errors
120
Linux XAGENT
Communications termination
Sednit Development Process (3)
Programming Errors
120
Linux XAGENT
Communications termination
Sednit Development Process (3)
Programming Errors
121
XTUNNEL report message
Sednit Development Process (3)
Programming Errors
121
XTUNNEL report message
Developers do not have a code
review process (“hackish” feeling)
Sednit Development Process (4)
Seeking Inspiration
• SEDUPLOADER employed novel persistence
methods also found in crimeware, and shares
code with Carberp
• DOWNDELPH bootkit code bears some
similarities with BlackEnergy code
122
Sednit Development Process (4)
Seeking Inspiration
• SEDUPLOADER employed novel persistence
methods also found in crimeware, and shares
code with Carberp
• DOWNDELPH bootkit code bears some
similarities with BlackEnergy code
122
Developers have ties with the
crimeware underground
Sednit Development Process (5)
Having Fun
123
Sednit Development Process (5)
Having Fun
123
Developers are not working in a
formal environment…
Mumblings Summary
Sednit has some in-house skilled developers,
working with little supervision, and those guys
have ties with crimeware underground
124
Conclusion
• Sednit activity increased a lot during the last
two years (targeted attacks with a LOT of
targets)
– Heard about the DNC hack last week?
• Sednit toolkit in constant evolution, moar fun
to come!
125
That’s All Folks!
• Feel free to poke us:
{calvet,campos,dupuy} .at. esetlabs.com
• Whitepaper coming soon!...
(“dans deux mois”)
126

Mais conteúdo relacionado

Mais procurados

TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)Mike Felch
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestSecuRing
 
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...CODE BLUE
 
Adversarial Post-Ex: Lessons From The Pros
Adversarial Post-Ex: Lessons From The ProsAdversarial Post-Ex: Lessons From The Pros
Adversarial Post-Ex: Lessons From The ProsJustin Warner
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani GolandCODE BLUE
 
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015CODE BLUE
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayChris Gates
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operationsSunny Neo
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guysNick Landers
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCanSecWest
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionBeau Bullock
 
Weekend Malware Research 2012
Weekend Malware Research 2012Weekend Malware Research 2012
Weekend Malware Research 2012Andrew Morris
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Chris Gates
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEChris Gates
 
Entomology 101
Entomology 101Entomology 101
Entomology 101snyff
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
 
Pwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellPwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellBeau Bullock
 
Red Team Apocalypse
Red Team ApocalypseRed Team Apocalypse
Red Team ApocalypseBeau Bullock
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud SecuritySBWebinars
 

Mais procurados (20)

TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
 
Adversarial Post-Ex: Lessons From The Pros
Adversarial Post-Ex: Lessons From The ProsAdversarial Post-Ex: Lessons From The Pros
Adversarial Post-Ex: Lessons From The Pros
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
 
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions Today
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 
Pentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 EditionPentest Apocalypse - SANSFIRE 2016 Edition
Pentest Apocalypse - SANSFIRE 2016 Edition
 
Weekend Malware Research 2012
Weekend Malware Research 2012Weekend Malware Research 2012
Weekend Malware Research 2012
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
 
Entomology 101
Entomology 101Entomology 101
Entomology 101
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Pwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShellPwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShell
 
Red Team Apocalypse
Red Team ApocalypseRed Team Apocalypse
Red Team Apocalypse
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 

Semelhante a Visiting the Bear Den

Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2ShapeBlue
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】Hacks in Taiwan (HITCON)
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Chris Gates
 
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...Felipe Prado
 
My tryst with sourcecode review
My tryst with sourcecode reviewMy tryst with sourcecode review
My tryst with sourcecode reviewAnant Shrivastava
 
Demo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionDemo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionNeo4j
 
Protect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesProtect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesLeo Loobeek
 
Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016John Bambenek
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device InsecurityJeremy Brown
 
ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018prashant3535
 
Travelling to the far side of Andromeda
Travelling to the far side of AndromedaTravelling to the far side of Andromeda
Travelling to the far side of AndromedaJose Miguel Esparza
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!Rafal Los
 
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"StHack
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a HackerCisco Canada
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsSynopsys Software Integrity Group
 
Hacking your Droid (Aditya Gupta)
Hacking your Droid (Aditya Gupta)Hacking your Droid (Aditya Gupta)
Hacking your Droid (Aditya Gupta)ClubHack
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class Chris Gates
 
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Positive Hack Days
 

Semelhante a Visiting the Bear Den (20)

Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
 
My tryst with sourcecode review
My tryst with sourcecode reviewMy tryst with sourcecode review
My tryst with sourcecode review
 
Demo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionDemo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in Action
 
Protect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesProtect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying Techniques
 
Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device Insecurity
 
ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018
 
Travelling to the far side of Andromeda
Travelling to the far side of AndromedaTravelling to the far side of Andromeda
Travelling to the far side of Andromeda
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!
 
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Starwest 2008
Starwest 2008Starwest 2008
Starwest 2008
 
Hacking your Droid (Aditya Gupta)
Hacking your Droid (Aditya Gupta)Hacking your Droid (Aditya Gupta)
Hacking your Droid (Aditya Gupta)
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
 
Phd final
Phd finalPhd final
Phd final
 

Mais de ESET

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity studentsESET
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity trainingESET
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?ESET
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...ESET
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...ESET
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent ThreatsESET
 
Shopping Online
Shopping OnlineShopping Online
Shopping OnlineESET
 
Banking Online
Banking OnlineBanking Online
Banking OnlineESET
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?ESET
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? ESET
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresESET
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESETESET
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat ReviewESET
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsESET
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyESET
 

Mais de ESET (20)

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity students
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity training
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
Shopping Online
Shopping OnlineShopping Online
Shopping Online
 
Banking Online
Banking OnlineBanking Online
Banking Online
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct?
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasures
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESET
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platforms
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet Privacy
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Visiting the Bear Den