SlideShare una empresa de Scribd logo
1 de 52
Descargar para leer sin conexión
Hack & Fix 

Hands on ColdFusion Security Training
Pete Freitag, Foundeo Inc.
David Epler, AboutWeb LLC
About Pete
• 17+Years ColdFusion Experience
• Job: Foundeo Inc. Consulting & Products
• CFSummit Gold Sponsor
• HackMyCF / FuseGuard
• blog: petefreitag.com
• twitter: @pfreitag
foundeo
• 15+ years ColdFusion experience
• Job: AboutWeb - Security Architect
• Several Security Certs: GWAPT, CEH
• Learn CF in a Week - Security
• OWASP Zed Attack Proxy (ZAP)
Evangelist
• blog: dcepler.net
• twitter: @dcepler
About David
Agenda
• About theVM
• File UploadVulnerabilities
• SQL Injection
• Path Traversals
• Cross Site Scripting
• OWASP ZAP
• Sneak Peak - ColdFusion Raijin/Blizzard
About theVM
• Ubuntu Linux (don’t worry)
• ColdFusion 11
• MySQL
• Username / password: cf / cf
• CF Admin Username / password: admin / cf
VM Setup
• Open Terminal
• cd /var/www/hackabletype
• git config —global user.email “cfsummit”
• git pull
• sudo a2dismod autoindex
• sudo service apache2 restart
Guiding Principals
• Defense In Depth
• Principal of Least Privilege
• Avoid Security by Obscurity
• Validation can save your bacon
• Even the best developers write insecure
code.
Hackable Type
http://hackabletype.local/
File Uploads
HackableType:Try to upload and execute a CFM file.
photo (cc) flickr user armchairbuilder 2012
File Uploads Rule #1
Never trust a MIME type
Never trust a MIME
• CF9 and below use the MIME type passed
by the browser / client.
• Attacker can send any MIME type.
• CF10+ can perform server side file
inspection (when strict=true, default).
• We can still get around this.
File Uploads Rule #2
AlwaysValidate The File Extension
Always validate file
extension
• CF10 allows you to specify a file extension
list in the accept attribute.
• You can also validate cffile.ServerFileExt
• Do both.
File Uploads Rule #3
Never upload directly to webroot
POST /upload.cfm
GET /photos/photo.cfm
Server
Hacker
Hacker uses a load tool to make repeated
concurrent requests.
The attacker will be able to 

execute photo.cfm before it is deleted.
Don't upload to web
root
• File can be executed before it's validated.
• Upload outside root, eg GetTempDirectory
ram://, s3, etc.
• Upload directly to S3: http://
www.petefreitag.com/item/833.cfm
Additional Tips
• Ensure upload directory can only serve
static files. Sandbox / file extension
whitelist on web server.
• Consider keeping files outside webroot and
serve with cfcontent or mod_xsendfile
• Specify mode on unix (eg 640 rw-r——)
• secureupload.cfc: https://github.com/
foundeo/cfml-security
SQL Injection
TweetPic from
someone that did
not responsibly
disclose issue to
site owner that has
SQL Injection
SQL Injection
<cfquery name="news">
SELECT id, title, story
FROM news
WHERE id = #url.id#
</cfquery>
news.cfm?id=1;delete+from+news
SQL Injection
• The solution - use parameters (eg
cfqueryparam) whenever possible.
• Validate and sanitize when you can't
• ORDER BY column
• SELECT TOP 10
• ORM: make sure HQL statements are
parameterized
SQL Injection
Try the lesson
Path Traversal
Vulnerabilities
Path Traversal Risk
• Attacker can read any file CF has
permission to read
• Configuration files
• System Files
• Logs
• Remote code execution possible in some
cases.
HackableType
Try the path traversal lesson
Preventing Path
Traversals
• Avoid file paths derived from user input.
• Strip and validate any variables used in
paths. Dots and slashes are dangerous.
• Beware of null bytes
• On windows use multiple drive letters to
separate application from OS, CF, logs, etc.
Path Traversal Bonus
Round
Can you use the path traversal lesson to perform
remote code execution?
Path Traversal
• Possible Remote Code Execution via
cfinclude
• CF11+ added Application.cfc and
ColdFusion administrator setting:
this.compileExtForInclude="cfm";
Cross Site Scripting

(XSS)
XSS
• XSS holes give attackers a CMS to create
any content.
• Can be used to steal sessions
• Phish for passwords or other info.
XSS Types
• Reflected
• Persistant
• DOM
Reflected XSS
<cfoutput>
Hello #url.name#
</cfoutput>
hello.cfm?name=<script>...</script>
Reflected XSS
Try the lesson
Preventing XSS
• Strip out dangerous characters
• < > ' " ( ) ; #
• Escape dangerous characters
• CF10+ EncodeForHTML, etc.
Preventing XSS
Context Method
HTML encodeForHTML(variable)
HTML Attribute encodeForHTMLAttribute(variable)
JavaScript encodeForJavaScript(variable)
CSS encodeForCSS(variable)
URL encodeForURL(variable)
XSS in HTML
• Preventing XSS when allowing users to
enter HTML is difficult.
• AntiSamy -> isSafeHTML getSafeHTML
• ScrubHTML
XSS Utils
• Encoders
• ESAPI: http://
www.petefreitag.com/
item/788.cfm
• OWASP Encoder:
http://owasp-java-
encoder.googlecode.c
om

• Sanitizers
• AntiSamy: http://
www.petefreitag.com/
item/760.cfm
• ScrubHTML: https://
github.com/foundeo/
cfml-security
OWASP ZAP
• An easy to use web application penetration
testing tool
• Completely free and Open Source
• OWASP flagship project
• Included in major security distributions
• Kali, Samurai WTF, etc.
Why use ZAP?
• Ideal for beginners, developers
• also used by professional pen testers
• Point and shoot via Quick Start Tab
• Manual penetration testing
• As a debugger
• As part of larger security program
• Automated security regression tests
Main ZAP Features
• Intercepting Proxy
• Active and Passive Scanners
• Traditional and AJAX spiders
• Forced browsing
• Fuzzing
• Cross Platform
• built on Java (requires 1.7+)
Website
Intercepting Proxy
Using ZAP
Hands on
Content-Security-Policy
• HTTP Response Header dictates what
assets can be loaded. For example:
• script-src 'self';
• script-src 'self' cdn.example.com;
• script-src 'none';
• script-src 'unsafe-inline';
CSP Directives
• default-src
• script-src
• style-src
• img-src
• connect-src
• font-src
• object-src
• media-src
• frame-src
• sandbox
• report-uri
CSP 1.0 Browser Support
http://caniuse.com/#feat=contentsecuritypolicy
CSP 1.0 Browser
Support
• Chrome 25+
• FireFox 23+
• Safari 7+
• IE Edge 12+
• Partial Support in IE10+ (sandbox)
CSP Level 2
• Notable Enhancements
• Nonce
• Hash
• form-action directive
CSP Lesson
• Hint: content-security-policy.com
Want More?
• Scope Injection Lesson
• CSRF Lesson
ColdFusion 

Raijin/Blizzard

Security Analyzer
Questions?
ThankYou!
Pete Freitag
pete@foundeo.com
foundeo.com
David Epler
depler@aboutweb.com
dcepler.net

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for Pentesting
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Unrestricted file upload
Unrestricted file uploadUnrestricted file upload
Unrestricted file upload
 
iOS Application Pentesting
iOS Application PentestingiOS Application Pentesting
iOS Application Pentesting
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
 
Buffer overflow
Buffer overflowBuffer overflow
Buffer overflow
 
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf)   it 6873 presentationA8 cross site request forgery (csrf)   it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentation
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introduction
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 EditionGoing Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Ethical hacking with Python tools
Ethical hacking with Python toolsEthical hacking with Python tools
Ethical hacking with Python tools
 
Racing The Web - Hackfest 2016
Racing The Web - Hackfest 2016Racing The Web - Hackfest 2016
Racing The Web - Hackfest 2016
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
Ch 5: Bypassing Client-Side Controls
Ch 5: Bypassing Client-Side ControlsCh 5: Bypassing Client-Side Controls
Ch 5: Bypassing Client-Side Controls
 
CSRF-Lecture13.pptx
CSRF-Lecture13.pptxCSRF-Lecture13.pptx
CSRF-Lecture13.pptx
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
 
Spring security
Spring securitySpring security
Spring security
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Burp suite
Burp suiteBurp suite
Burp suite
 

Destacado (8)

Hack Harvard 2012: Open Source is Big Business
Hack Harvard 2012: Open Source is Big BusinessHack Harvard 2012: Open Source is Big Business
Hack Harvard 2012: Open Source is Big Business
 
Hacker
HackerHacker
Hacker
 
CARA BOBOL ROUTER WIFI ID
CARA BOBOL ROUTER WIFI IDCARA BOBOL ROUTER WIFI ID
CARA BOBOL ROUTER WIFI ID
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Full Buku sakti belajar hacker
Full Buku sakti belajar hackerFull Buku sakti belajar hacker
Full Buku sakti belajar hacker
 
10 Langkah Awal Menjadi Seorang Ahli Komputer
10 Langkah Awal Menjadi Seorang Ahli Komputer10 Langkah Awal Menjadi Seorang Ahli Komputer
10 Langkah Awal Menjadi Seorang Ahli Komputer
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar a Hack & Fix, Hands on ColdFusion Security Training

Fix me if you can - DrupalCon prague
Fix me if you can - DrupalCon pragueFix me if you can - DrupalCon prague
Fix me if you can - DrupalCon prague
hernanibf
 
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilitiesVorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
DefconRussia
 
Krzysztof Kotowicz - Hacking HTML5
Krzysztof Kotowicz - Hacking HTML5Krzysztof Kotowicz - Hacking HTML5
Krzysztof Kotowicz - Hacking HTML5
DefconRussia
 
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdfEN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
GiorgiRcheulishvili
 
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: WebShells by Adrian CrenshawTakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
EC-Council
 

Similar a Hack & Fix, Hands on ColdFusion Security Training (20)

Securing Legacy CFML Code
Securing Legacy CFML CodeSecuring Legacy CFML Code
Securing Legacy CFML Code
 
Securing applications
Securing applicationsSecuring applications
Securing applications
 
ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdf
ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdfITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdf
ITB_2023_25_Most_Dangerous_Software_Weaknesses_Pete_Freitag.pdf
 
Splunk: Forward me the REST of those shells
Splunk: Forward me the REST of those shellsSplunk: Forward me the REST of those shells
Splunk: Forward me the REST of those shells
 
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systemsDEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
 
Rails Security
Rails SecurityRails Security
Rails Security
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking it
 
Html5 hacking
Html5 hackingHtml5 hacking
Html5 hacking
 
Fix me if you can - DrupalCon prague
Fix me if you can - DrupalCon pragueFix me if you can - DrupalCon prague
Fix me if you can - DrupalCon prague
 
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilitiesVorontsov, golovko   ssrf attacks and sockets. smorgasbord of vulnerabilities
Vorontsov, golovko ssrf attacks and sockets. smorgasbord of vulnerabilities
 
CollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) Hackable
CollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) HackableCollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) Hackable
CollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) Hackable
 
Krzysztof Kotowicz - Hacking HTML5
Krzysztof Kotowicz - Hacking HTML5Krzysztof Kotowicz - Hacking HTML5
Krzysztof Kotowicz - Hacking HTML5
 
Locking Down CF Servers
Locking Down CF ServersLocking Down CF Servers
Locking Down CF Servers
 
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdfEN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
 
External JavaScript Widget Development Best Practices (updated) (v.1.1)
External JavaScript Widget Development Best Practices (updated) (v.1.1) External JavaScript Widget Development Best Practices (updated) (v.1.1)
External JavaScript Widget Development Best Practices (updated) (v.1.1)
 
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: WebShells by Adrian CrenshawTakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Ruby on Rails Security Guide
Ruby on Rails Security GuideRuby on Rails Security Guide
Ruby on Rails Security Guide
 
Securing your web apps now
Securing your web apps nowSecuring your web apps now
Securing your web apps now
 

Más de ColdFusionConference

Más de ColdFusionConference (20)

Api manager preconference
Api manager preconferenceApi manager preconference
Api manager preconference
 
Cf ppt vsr
Cf ppt vsrCf ppt vsr
Cf ppt vsr
 
Building better SQL Server Databases
Building better SQL Server DatabasesBuilding better SQL Server Databases
Building better SQL Server Databases
 
API Economy, Realizing the Business Value of APIs
API Economy, Realizing the Business Value of APIsAPI Economy, Realizing the Business Value of APIs
API Economy, Realizing the Business Value of APIs
 
Don't just pdf, Smart PDF
Don't just pdf, Smart PDFDon't just pdf, Smart PDF
Don't just pdf, Smart PDF
 
Crafting ColdFusion Applications like an Architect
Crafting ColdFusion Applications like an ArchitectCrafting ColdFusion Applications like an Architect
Crafting ColdFusion Applications like an Architect
 
Security And Access Control For APIS using CF API Manager
Security And Access Control For APIS using CF API ManagerSecurity And Access Control For APIS using CF API Manager
Security And Access Control For APIS using CF API Manager
 
Monetizing Business Models: ColdFusion and APIS
Monetizing Business Models: ColdFusion and APISMonetizing Business Models: ColdFusion and APIS
Monetizing Business Models: ColdFusion and APIS
 
Become a Security Rockstar with ColdFusion 2016
Become a Security Rockstar with ColdFusion 2016Become a Security Rockstar with ColdFusion 2016
Become a Security Rockstar with ColdFusion 2016
 
ColdFusion in Transit action
ColdFusion in Transit actionColdFusion in Transit action
ColdFusion in Transit action
 
Developer Insights for Application Upgrade to ColdFusion 2016
Developer Insights for Application Upgrade to ColdFusion 2016Developer Insights for Application Upgrade to ColdFusion 2016
Developer Insights for Application Upgrade to ColdFusion 2016
 
Where is cold fusion headed
Where is cold fusion headedWhere is cold fusion headed
Where is cold fusion headed
 
ColdFusion Keynote: Building the Agile Web Since 1995
ColdFusion Keynote: Building the Agile Web Since 1995ColdFusion Keynote: Building the Agile Web Since 1995
ColdFusion Keynote: Building the Agile Web Since 1995
 
Instant ColdFusion with Vagrant
Instant ColdFusion with VagrantInstant ColdFusion with Vagrant
Instant ColdFusion with Vagrant
 
Restful services with ColdFusion
Restful services with ColdFusionRestful services with ColdFusion
Restful services with ColdFusion
 
Super Fast Application development with Mura CMS
Super Fast Application development with Mura CMSSuper Fast Application development with Mura CMS
Super Fast Application development with Mura CMS
 
Build your own secure and real-time dashboard for mobile and web
Build your own secure and real-time dashboard for mobile and webBuild your own secure and real-time dashboard for mobile and web
Build your own secure and real-time dashboard for mobile and web
 
Why Everyone else writes bad code
Why Everyone else writes bad codeWhy Everyone else writes bad code
Why Everyone else writes bad code
 
Testing automaton
Testing automatonTesting automaton
Testing automaton
 
Rest ful tools for lazy experts
Rest ful tools for lazy expertsRest ful tools for lazy experts
Rest ful tools for lazy experts
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Hack & Fix, Hands on ColdFusion Security Training