SlideShare uma empresa Scribd logo
1 de 244
Deviant Ollam & Howard Payne
DEFCON 22 – 2014/08/03
ELEVATOR HACKING
FROM THE PIT TO THE PENTHOUSE
WHO ARE WE?
http://enterthecore.net
Who Are We?
Deviant Ollam
– Physical Penetration Tester
– Red Teamer
– Lockpicker
– Liquor of Choice: Lagavulin
Howard Payne
– Elevator Consultant & Inspector
– Non-Union
– Boardwalk Badass
– Liquor of Choice: American Adjunct Lager
http://enterthecore.net
Who Are We?
Deviant Ollam
– Physical Penetration Tester
– Red Teamer
– Lockpicker
– Liquor of Choice: Lagavulin
Howard Payne
– Elevator Consultant & Inspector
– Non-Union
– Boardwalk Badass
– Liquor of Choice: American Adjunct Lager
WARNING!
http://enterthecore.net
If Used Properly Elevators are Incredibly Safe –
• NYC alone has almost 60,000 elevators
• 11 billion trips per year, 30 million every day
• Annually there are only about 24 injuries requiring medical attention
http://enterthecore.net
If Used Properly Elevators are Incredibly Safe –
• NYC alone has almost 60,000 elevators
• 11 billion trips per year, 30 million every day
• Annually there are only about 24 injuries requiring medical attention
Throughout the entire nation of 300+ million citizens, an average
of just 26 people die in a given year riding elevators…
http://enterthecore.net
If Used Properly Elevators are Incredibly Safe –
• NYC alone has almost 60,000 elevators
• 11 billion trips per year, 30 million every day
• Annually there are only about 24 injuries requiring medical attention
Throughout the entire nation of 300+ million citizens, an average
of just 26 people die in a given year riding elevators…
… the vast majority are trained professionals
working on the devices at the time.
http://enterthecore.net
Warning – Dying is Not Good
http://enterthecore.net
Warning – Damage is Not Good
http://enterthecore.net
Warning – Damage is Not Good
http://enterthecore.net
Warning – Damage is Not Good
http://enterthecore.net
Warning – We’re Professionals
INTRODUCTION TO
ELEVATORS
http://enterthecore.net
Terms & Technology – Traction vs Hydro
http://enterthecore.net
Terms & Technology – The Elevator Cab
http://enterthecore.net
Terms & Technology – The Elevator Cab
http://enterthecore.net
Terms & Technology – Rails & Rollers
http://enterthecore.net
Terms & Technology – Rails & Rollers
http://enterthecore.net
Terms & Technology – Fixtures
Car Operating Panel
Position Indicator
Car Travel Lantern
Hall Lantern
Hall Stations
http://enterthecore.net
Terms & Technology – Motor Room
http://enterthecore.net
Terms & Technology – Motor Room (Hydraulic)
http://enterthecore.net
Terms & Technology – No Motor Room
http://enterthecore.net
Terms & Technology – Controller
http://enterthecore.net
Terms & Technology – Controller
http://enterthecore.net
Limit Switches
http://enterthecore.net
Velocity Detection
http://enterthecore.net
Safety Mechanisms – Overspeed Brake
http://enterthecore.net
Safety Mechanisms – Governor (to Trigger Safeties)
http://enterthecore.net
Safety Mechanisms – Rail Gripper Safety
http://enterthecore.net
Safety Mechanisms – Modern Rail Gripper Safety
http://enterthecore.net
Safety Mechanisms – Modern Rail Gripper Safety
http://enterthecore.net
Safety Mechanisms – Modern Rail Gripper Safety
http://enterthecore.net
Safety Mechanisms – Modern Rail Gripper Safety
http://enterthecore.net
Safety Mechanisms – Modern Rail Gripper Safety
http://enterthecore.net
Safety Mechanisms – Modern Rail Gripper Safety
http://enterthecore.net
Safety Mechanisms – If All Else Fails… There’s the Buffer
http://enterthecore.net
Elevators Want To Keep You Alive
http://enterthecore.net
Elevators on Automatic Mode Do Their Job Well Everyday
http://enterthecore.net
…Unless You’re on the Car Top, Derpface
SPECIAL MODES OF
OPERATION
http://enterthecore.net
Independent Service
http://enterthecore.net
Independent Service
http://enterthecore.net
Independent Service
http://enterthecore.net
Attendant Service
http://enterthecore.net
Attendant Service
http://enterthecore.net
Attendant Service
http://enterthecore.net
Express / Executive / VIP service
http://enterthecore.net
Sabbath Mode
http://enterthecore.net
Sabbath Mode
http://enterthecore.net
Sabbath Mode
http://enterthecore.net
Sabbath Mode
http://enterthecore.net
Load Bypass
http://enterthecore.net
Load Bypass
http://enterthecore.net
Anti Nuisance / No Passenger
http://enterthecore.net
Anti Nuisance / No Passenger
http://enterthecore.net
Up Peak / Down Peak
http://enterthecore.net
Riot Mode
http://enterthecore.net
Seismic Mode
http://enterthecore.net
Code Blue
http://enterthecore.net
Code Blue
http://enterthecore.net
Code Blue
http://enterthecore.net
Code Pink
http://enterthecore.net
Code Pink
http://enterthecore.net
Security Recall
http://enterthecore.net
Security Recall
http://enterthecore.net
Security Service
http://enterthecore.net
Security Service
http://enterthecore.net
Fire Service
http://enterthecore.net
Hoistway Inspection
http://enterthecore.net
Hoistway Inspection
http://enterthecore.net
Hoistway Inspection
ELEVATOR SECURITY
(HOW IT’S ATTEMPTED)
http://enterthecore.net
Disabled Hall Call Buttons
http://enterthecore.net
No Hall Call Buttons
http://enterthecore.net
Keycard to Register Hall Call
http://enterthecore.net
Floor Cutouts
http://enterthecore.net
Floor Cutouts
http://enterthecore.net
Floor Cutouts
http://enterthecore.net
Floor Cutouts
not code
compliant!
http://enterthecore.net
Floor Cutouts
?
http://enterthecore.net
Floor Cutouts
http://enterthecore.net
Badge Systems
http://enterthecore.net
Physically Securing the Elevator Area
http://enterthecore.net
Physically Securing the Elevator Area
http://enterthecore.net
Think of Elevators like Stairwells… but Sometimes Even Worse
ELEVATOR SECURITY
(HOW IT’S SUBVERTED)
http://enterthecore.net
When There Are No Hall Call Buttons
http://enterthecore.net
When There Are No Hall Call Buttons
http://enterthecore.net
When There Are No Hall Call Buttons
http://enterthecore.net
Key Switches
http://enterthecore.net
Key Switches
http://enterthecore.net
Key Switches
http://enterthecore.net
Key Switches
http://enterthecore.net
Key Switches
Welcome To the Kingdom of Keys!
Welcome To the Kingdom of Keys!
http://enterthecore.net
Keys & Fixtures
Brands of Elevator
• Otis
• Cemco
• ThyssenKrupp
• Dover
• US Elevator
• KONE
• Montgomery
• Armor
• Schindler
• Westinghouse
• O. Thompson
• Payne
Brands of Fixtures
• G.A.L.
• EPCO
• Innovation
• Adams
• Monitor / Janus
• CJ Anderson
• P.T.L.
• MAD
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
http://enterthecore.net
Keys & Fixtures
The artist formerly known as
http://enterthecore.net
Key Suppliers
http://enterthecore.net
Key Suppliers
http://enterthecore.net
Key Suppliers
http://enterthecore.net
Key Suppliers
http://enterthecore.net
Key Suppliers
http://enterthecore.net
Key Suppliers
http://enterthecore.net
Key Suppliers
VS.
http://enterthecore.net
Key Suppliers
VS.
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
The Industry is WAY Behind the Times on Security
http://enterthecore.net
ASME A17.1 (2007): Safety Code for Elevators & Escalators
2.27.8 Switch Keys
The key switches required by 2.27.2 through 2.27.5 for all elevators in a building shall be operable by the
same key. The keys shall be Group 3 Security (see 8.1). There shall be a key for each switch provided. These
keys shall be kept on the premises in a location readily accessible to firefighters and emergency
personnel, but not where they are available to the public.
This key shall be of a tubular, 7 pin, style 137 construction and shall have a bitting code of 6143521. The key
shall be coded "FEO-K1.“
The possession of the "FEO-K1“ key shall be limited to elevator personnel, emergency personnel, and elevator
equipment manufacturers. Where provided, a lock box, including its lock and other components, shall conform
to the requirements of UL 1037 (see Part 9).
NOTE (2.27.8): Local authorities may specify additional requirements for a uniform keyed lock box and its
location to contain the necessary keys.
The Industry is WAY Behind the Times on Security
http://enterthecore.net
It’s All Naked on the Inside
http://enterthecore.net
Unsecured Car Panels
http://enterthecore.net
What About Keycard Systems?
http://enterthecore.net
What About Keycard Systems?
http://enterthecore.net
Exploiting Keycards
Major Malfunction – Magstripe Madness (DEFCON 14)
https://www.youtube.com/watch?v=MY_p8C9jJCk
MAGS TRIP EMAD NESS
So What Do Pen Testers Do?
http://enterthecore.net
Independent Service
http://enterthecore.net
And Sometimes Fire Service
http://enterthecore.net
Fire Service
http://enterthecore.net
Fire Service
http://enterthecore.net
Fire Service
“The Post published pictures of the fire service keys only after checking with locksmiths who said duplicates
could not be made without the originals in hand.” http://nypost.com/2012/10/01/lock-away-these-nyc-keys
http://enterthecore.net
Fire Service
The Infamous “2642 Key”
Yale Y1 key (unrestricted blank)
Bitting Code: 2-6-4-2-0
http://enterthecore.net
Fire Service
The “3502 Key”
Yale Y2 key (unrestricted blank)
Bitting Code: 0-3-2-3-4-8
http://enterthecore.net
Fire Service
The Tennessee Key
Gamewell “Christmas Tree” Key
reused and repurposed
http://enterthecore.net
Fire Service
The Indiana Key
7-pin Tubular Key (unrestricted blank)
Bitting Code: X-X-X-X-X-X-X
http://enterthecore.net
Fire Service
The “XXXX” Key
Medeco Cam (restricted blank)
Bitting: X-X-X-X-X Sidebar: X-X-X-X-X
http://enterthecore.net
Fire Service
The “XXXX” Key
Medeco Cam (restricted blank)
Bitting: X-X-X-X-X Sidebar: X-X-X-X-X
http://enterthecore.net
Exploiting BACnet
Brad Bowers – How To Own A Building: Exploiting the Physical World With BACnet (ShmooCon 2013)
http://www.youtube.com/watch?v=d3jtmv6Y9uk
http://enterthecore.net
Hoistway Access
http://enterthecore.net
Hoistway Access
http://enterthecore.net
Escutcheon Holes
http://enterthecore.net
Door Releases
http://enterthecore.net
Escutcheon Holes
http://enterthecore.net
“It’s in that place where I put that thing that time.”
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Escutcheon Locks
http://enterthecore.net
Machine Room Access
http://enterthecore.net
Machine Room
A Fair Analogy
Floor Cutout Locks. . . . . . . . . . . . . . . . . . . . User Passwords
Independent Service . . . . . . . . . . . . . . . . . . . . Local Admin
Fire Service . . . . . . . . . . . . . . . . . . . . . . . . . Domain Admin
Hoistway Access . . . . . . . . . . . . . . . . . . . . . . . . . . . System
Machine Room Access . . . . . . . . . . . . . . . . . . . . Hypervisor
http://enterthecore.net
Machine Room – Direct Operation via the Controller
http://enterthecore.net
Machine Room – Direct Operation via the Controller
http://enterthecore.net
Machine Room – Hacking & Manipulating the Controller
http://enterthecore.net
Machine Room – Hacking & Manipulating the Controller
http://enterthecore.net
Machine Room – Hacking & Manipulating (5-Year Test)
http://enterthecore.net
Machine Room – Hacking & Manipulating is Dangerous!
http://enterthecore.net
How POTUS Rolls
ELEVATOR PHREAKING
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
http://enterthecore.net
Emergency Phones in Elevators
COMMON VIOLATIONS,
ISSUES, & GUIDANCE
http://enterthecore.net
Entrapments
http://enterthecore.net
Code Violations
http://enterthecore.net
Code Violations
http://enterthecore.net
Phone Violations
http://enterthecore.net
Alarm Bell
http://enterthecore.net
“Assault” Switch
http://enterthecore.net
“Assault” Switch
http://enterthecore.net
Unsecured Motor Rooms and Hoistways
http://enterthecore.net
Unsecured Motor Rooms and Hoistways
http://enterthecore.net
Unsecured Motor Rooms and Hoistways
http://enterthecore.net
Unsecured Motor Rooms and Hoistways
http://enterthecore.net
Improperly Secured Motor Rooms and Hoistways
http://enterthecore.net
Improperly Secured Motor Rooms and Hoistways
http://enterthecore.net
Improperly Secured Motor Rooms and Hoistways
http://enterthecore.net
Improperly Secured Motor Rooms and Hoistways
http://enterthecore.net
Know Who Your Contractor Is!
http://enterthecore.net
Know Who Your Contractor Is!
1. Facilities / Operations
2. Elevator Contractor
- Constructor
- Maintenance Contractor / Mechanic
• parts, oil, grease -or- regular maintenance
• basic troubleshooting
- Adjuster / Troubleshooter
3. Consultants
- Performance
- Monitoring
- Safety / Post-accidents
4. Inspection
- AHJ (Authority Having Jurisdiction… Municipal / State Inspectors)
- Third Party (QEI – Qualified Elevator Inspector)
- Second Party (Contractor inspects and certifies self)
http://enterthecore.net
Oversight of Your Maintenance Control Program
http://enterthecore.net
Oversight of Your Maintenance Control Program
http://enterthecore.net
Oversight of Your Maintenance Control Program
http://enterthecore.net
Oversight of Your Maintenance Control Program
http://enterthecore.net
Conflicts of Interest
http://enterthecore.net
Be Wary of Bullshit Service
http://enterthecore.net
Be Wary of Bullshit Service
http://enterthecore.net
Tests Are Important!
http://enterthecore.net
Follow All of Your Building Procedures
SO WHAT NOW?
http://enterthecore.net
So What Now?
APT elevator
attacks??
Impossibru!!
http://enterthecore.net
There are Elevator Techs
http://enterthecore.net
And There are Elevator Techs who are Security Consultants
http://enterthecore.net
“I Don’t Want My Elevator on the Internet but I Want Monitoring”
FINAL TIPS
PREVENTING & CORRECTING PROBLEMS
http://enterthecore.net
If Someone (Including You) Is Stuck in an Elevator
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic (and don’t press emergency call just yet)
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
• Main lights off? You don’t have many options (emerg. call)
• Main lights on? Try the following…
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
2. Press Door Open (exit safely if doors open)
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
2. Press Door Open
3. Press Door Close, Then Press Door Open Again
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
2. Press Door Open
3. Press Door Close, Then Press Door Open Again
4. Try Placing Calls to Other Floors, Including Lobby
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
2. Press Door Open
3. Press Door Close, Then Press Door Open Again
4. Try Placing Calls to Other Floors, Including Lobby
5. Make Sure You’re Badged In, Try Floor Calls Again
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
2. Press Door Open
3. Press Door Close, Then Press Door Open Again
4. Try Placing Calls to Other Floors, Including Lobby
5. Make Sure You’re Badged In, Try Floor Calls Again
6. If Authorized, Try Using Keyswitches (IND Mode)
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
2. Press Door Open
3. Press Door Close, Then Press Door Open Again
4. Try Placing Calls to Other Floors, Including Lobby
5. Make Sure You’re Badged In, Try Floor Calls Again
6. If Authorized, Try Using Keyswitches (IND Mode)
7. Verify the Cab Doors Are Closed
(Unless you heard something loudly fail)
http://enterthecore.net
Follow These Simple Steps…
1. Don’t Panic
2. Press Door Open
3. Press Door Close, Then Press Door Open Again
4. Try Placing Calls to Other Floors, Including Lobby
5. Make Sure You’re Badged In, Try Floor Calls Again
6. If Authorized, Try Using Keyswitches (IND Mode)
7. Verify the Cab Doors Are Closed
8. If Nothing Worked, Call For Help
(Emergency Phone or Mobile Phone or Radio)
http://enterthecore.net
Things To NEVER Try When Stuck…
1. Leaving Through the Top Hatch
• It’s dangerous
• It will foul up other procedures
http://enterthecore.net
Things To NEVER Try When Stuck…
1. Leaving Through the Top Hatch
2. Exiting a Mis-Leveled Car
• If you have to jump, that’s too far!
http://enterthecore.net
Things To NEVER Try When Stuck…
1. Leaving Through the Top Hatch
2. Exiting a Mis-Leveled Car
3. The Safest Place to Be is in the Elevator Itself
http://enterthecore.net
Thank You Very Much!
delta@enterthecore.net howard@payneelevator.com
@deviantollam @sgthowardpayne

Mais conteúdo relacionado

Destaque

Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Priyanka Aash
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomPriyanka Aash
 
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacDefcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacPriyanka Aash
 
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fiDefcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fiPriyanka Aash
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityPriyanka Aash
 
Defcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posDefcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posPriyanka Aash
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwarePriyanka Aash
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 

Destaque (10)

Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-room
 
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacDefcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
 
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fiDefcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-security
 
Defcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-posDefcon 22-nir-valtman-a-journey-to-protect-pos
Defcon 22-nir-valtman-a-journey-to-protect-pos
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 

Semelhante a Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr

The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamShakacon
 
Elevatorsafety livingwell
Elevatorsafety livingwellElevatorsafety livingwell
Elevatorsafety livingwellSharonP123
 
Wheel and Tire Failure : Brief Introduction to this Particular Risk Analysis.
Wheel and Tire Failure : Brief Introduction to this Particular Risk Analysis.Wheel and Tire Failure : Brief Introduction to this Particular Risk Analysis.
Wheel and Tire Failure : Brief Introduction to this Particular Risk Analysis.Frédéric Contenot, CEng
 
Quiko automation systems for gates & doors
Quiko automation systems for gates & doorsQuiko automation systems for gates & doors
Quiko automation systems for gates & doorsQuiko Italy Srl
 
VTME ELEVATOR CONSULTANTS Emergency operations ew nov14
VTME ELEVATOR CONSULTANTS Emergency operations ew nov14VTME ELEVATOR CONSULTANTS Emergency operations ew nov14
VTME ELEVATOR CONSULTANTS Emergency operations ew nov14SAMSON BABU MCIBSE
 
Harmonic drive hallow shaft actuators catalog
Harmonic drive hallow shaft actuators catalogHarmonic drive hallow shaft actuators catalog
Harmonic drive hallow shaft actuators catalogElectromate
 
Loading dock safety best practices document
Loading dock safety best practices documentLoading dock safety best practices document
Loading dock safety best practices documentkqyb2t49sr
 
Hotel - Specialised Services
Hotel - Specialised ServicesHotel - Specialised Services
Hotel - Specialised ServicesUtsavChaudhury
 
TYPICAL LIFT DESIGN (TRACTION AND HYDRAULIC LIFT) COMPONENTS AND OPERATIONS
TYPICAL LIFT DESIGN (TRACTION AND HYDRAULIC LIFT) COMPONENTS AND OPERATIONSTYPICAL LIFT DESIGN (TRACTION AND HYDRAULIC LIFT) COMPONENTS AND OPERATIONS
TYPICAL LIFT DESIGN (TRACTION AND HYDRAULIC LIFT) COMPONENTS AND OPERATIONSIzwanSyahmi
 
Tow flexx® 180e d Towbarless Electric Tug for Aircraft up to 55,000 lbs / 25,...
Tow flexx® 180e d Towbarless Electric Tug for Aircraft up to 55,000 lbs / 25,...Tow flexx® 180e d Towbarless Electric Tug for Aircraft up to 55,000 lbs / 25,...
Tow flexx® 180e d Towbarless Electric Tug for Aircraft up to 55,000 lbs / 25,...Areezo Avia LLP
 
Experimental verification and finite element analysis of a sliding door syste...
Experimental verification and finite element analysis of a sliding door syste...Experimental verification and finite element analysis of a sliding door syste...
Experimental verification and finite element analysis of a sliding door syste...Altair
 
High Voltage Electrical Compliance and Safety Operating Procedures
High Voltage Electrical Compliance and Safety Operating ProceduresHigh Voltage Electrical Compliance and Safety Operating Procedures
High Voltage Electrical Compliance and Safety Operating ProceduresLiving Online
 
Cctv lifts (safety lifting systems) - Maintain Ground Place
Cctv lifts (safety lifting systems)  - Maintain Ground PlaceCctv lifts (safety lifting systems)  - Maintain Ground Place
Cctv lifts (safety lifting systems) - Maintain Ground PlaceLEE Chang-Bin
 
Eryc Tri Juni S - Doorway: HCI-Driven Home Automation Feature Development Ro...
Eryc Tri Juni S - Doorway:  HCI-Driven Home Automation Feature Development Ro...Eryc Tri Juni S - Doorway:  HCI-Driven Home Automation Feature Development Ro...
Eryc Tri Juni S - Doorway: HCI-Driven Home Automation Feature Development Ro...Eryc Tri Juni S
 
Emic Effects on controlling automobile safety
Emic Effects on controlling automobile safety Emic Effects on controlling automobile safety
Emic Effects on controlling automobile safety Harshit Srivastava
 

Semelhante a Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr (20)

The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant Ollam
 
Elevatorsafety livingwell
Elevatorsafety livingwellElevatorsafety livingwell
Elevatorsafety livingwell
 
Wheel and Tire Failure : Brief Introduction to this Particular Risk Analysis.
Wheel and Tire Failure : Brief Introduction to this Particular Risk Analysis.Wheel and Tire Failure : Brief Introduction to this Particular Risk Analysis.
Wheel and Tire Failure : Brief Introduction to this Particular Risk Analysis.
 
Elevator system
Elevator systemElevator system
Elevator system
 
Quiko automation systems for gates & doors
Quiko automation systems for gates & doorsQuiko automation systems for gates & doors
Quiko automation systems for gates & doors
 
VTME ELEVATOR CONSULTANTS Emergency operations ew nov14
VTME ELEVATOR CONSULTANTS Emergency operations ew nov14VTME ELEVATOR CONSULTANTS Emergency operations ew nov14
VTME ELEVATOR CONSULTANTS Emergency operations ew nov14
 
CAME India Access Control Catalog
CAME India Access Control Catalog CAME India Access Control Catalog
CAME India Access Control Catalog
 
Harmonic drive hallow shaft actuators catalog
Harmonic drive hallow shaft actuators catalogHarmonic drive hallow shaft actuators catalog
Harmonic drive hallow shaft actuators catalog
 
Loading dock safety best practices document
Loading dock safety best practices documentLoading dock safety best practices document
Loading dock safety best practices document
 
Physical access-system-brochure
Physical access-system-brochurePhysical access-system-brochure
Physical access-system-brochure
 
Hotel - Specialised Services
Hotel - Specialised ServicesHotel - Specialised Services
Hotel - Specialised Services
 
Speedocontrols
SpeedocontrolsSpeedocontrols
Speedocontrols
 
TYPICAL LIFT DESIGN (TRACTION AND HYDRAULIC LIFT) COMPONENTS AND OPERATIONS
TYPICAL LIFT DESIGN (TRACTION AND HYDRAULIC LIFT) COMPONENTS AND OPERATIONSTYPICAL LIFT DESIGN (TRACTION AND HYDRAULIC LIFT) COMPONENTS AND OPERATIONS
TYPICAL LIFT DESIGN (TRACTION AND HYDRAULIC LIFT) COMPONENTS AND OPERATIONS
 
Tow flexx® 180e d Towbarless Electric Tug for Aircraft up to 55,000 lbs / 25,...
Tow flexx® 180e d Towbarless Electric Tug for Aircraft up to 55,000 lbs / 25,...Tow flexx® 180e d Towbarless Electric Tug for Aircraft up to 55,000 lbs / 25,...
Tow flexx® 180e d Towbarless Electric Tug for Aircraft up to 55,000 lbs / 25,...
 
Tapping machine accessories
Tapping machine accessoriesTapping machine accessories
Tapping machine accessories
 
Experimental verification and finite element analysis of a sliding door syste...
Experimental verification and finite element analysis of a sliding door syste...Experimental verification and finite element analysis of a sliding door syste...
Experimental verification and finite element analysis of a sliding door syste...
 
High Voltage Electrical Compliance and Safety Operating Procedures
High Voltage Electrical Compliance and Safety Operating ProceduresHigh Voltage Electrical Compliance and Safety Operating Procedures
High Voltage Electrical Compliance and Safety Operating Procedures
 
Cctv lifts (safety lifting systems) - Maintain Ground Place
Cctv lifts (safety lifting systems)  - Maintain Ground PlaceCctv lifts (safety lifting systems)  - Maintain Ground Place
Cctv lifts (safety lifting systems) - Maintain Ground Place
 
Eryc Tri Juni S - Doorway: HCI-Driven Home Automation Feature Development Ro...
Eryc Tri Juni S - Doorway:  HCI-Driven Home Automation Feature Development Ro...Eryc Tri Juni S - Doorway:  HCI-Driven Home Automation Feature Development Ro...
Eryc Tri Juni S - Doorway: HCI-Driven Home Automation Feature Development Ro...
 
Emic Effects on controlling automobile safety
Emic Effects on controlling automobile safety Emic Effects on controlling automobile safety
Emic Effects on controlling automobile safety
 

Mais de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Mais de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Último (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr