SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
)*5$0/ⶳయფ⫨Ⲣਫ਼ 
4IFMMTIPDLઅ⓮ᑂΩ 
$BTF4UVEZPG4IFMMTIPDL 
CZTIBPMJO
2 
TIBPMJO	௢Ꮛ
 
TIBPMJO!EFWDPSF
3 
4IFMM4IPDLମ▕֞ᴎ⾓Ք⿏⎛⭉⑸
4 
#BTI㙪ᮭ4IFMMTIPDLᦡᡂ㦎֞ᴎۃዾ⎛↫Ўᐎࣞ㏱ۗᙜ
HFOEB 
4IFMMTIPDLأྤᇓ⯁ 
ᓪђⲄ፧ 
዗ኄчᷗ$(*ỉ⎛㔄Ўᐎࣞ 
๲⑸ྻ࿞%)$1Ўᐎࣞ࿪ᒜ⿏⎸чᷗ⓱ 
␟⿧(JU4VCWFSTJPOЎᐎࣞỉTIFMM㏗ؕ 
዗ኄ.BJMЎᐎࣞ 
ऱၥ΍⿬ 
ಉ⍓ 
5
6 
أྤᇓ⯁
ᶁ਴ⴳዾٛͧ₵ધ఍Ϳ() { :;}; 
ᛦ㘵CBTIⱜᶁ਴ⴳዾ᫗ጫ᠎ిݥ 
क़₵ધ఍Ϳ໏ᆵϪ࿞ᅅϝಁᐆ⬦ৎ⫤ 
() { :;}; echo vulnerable 
7 
௠⫀␢ 
4IFMMTIPDLᔘ๭ 
༓༶ႝ̴
8 
ਦͺⲎ࿬ሯᇜ 
๏⬜ӷӜ⊉㡯 
㘓ా࿅⽽᠎㦑 
ტؐय़ጫ౲֜ᶁ਴ⴳዾ 
ტؐय़ጫރܛCBTI
9 
ᓪђⲄ፧
10 
ᑂΩ⯟኿ 
ߑα⌍⍮⇜ܮ዗ኄᔜϨ 
㘓ాܟϞ༢㣉؍ᷗ
11 
ᓪђ͡ 
዗ኄчᷗ$(*ỉ⎛㔄Ўᐎࣞ
12 
Ξᴰ$(*᳚ঋˤͥ፦࠵ 
ᔜϨ͡㦑ᶁ਴ⴳዾ 
)551)FBEFS֝౎ᐆఎ֜ᶁ਴ⴳዾ 
ᔜϨΧ㦑ৎ⫤CBTI 
ᐊαᆵܔᐥ⻳፽CBTITIFMMTDSJQU႙፽֦ఇ 
ℨรᐊރܛؐCBTI
13 
-BOHVBHF 7VMOFSBCMF'VODUJPO 
1FSM 
FYFD	EBUFEFWOVMM
 
PQFO	4)--4)0$,
]EBUFEFWOVMM
 
TZTUFN	EBUFEFWOVMM
 
QSJOUAEBUFEFWOVMMA 
1)1 
FYFD	EBUF
 
TZTUFN	EBUF
 
NC@TFOE@NBJM	
 
1ZUIPO 
PTTZTUFN	EBUF
 
TVCQSPDFTTDBMM	EBUF
TIFMM5SVF
 
TVCQSPDFTT1PQFO	EBUF
TIFMM5SVF
 
3VCZ 
AEBUFA 
FYFDEBUF 
TZTUFNEBUF
14 
DVSM	
^FDIPCJODBUFUDQBTTXEIUUQUBSHFU 
዗ኄḅ㒘Ⴆॎ
16 
㔃கਦͺդᴰ	
 
࡬ね 
Ŏ ܋໔⌍⍮ኆЪᛈ㏗	য໏㍫
 
Ŏ ↦܋ࠎᖱⶳጓɗᐆ߉ⶳጓ 
Ŏ #PUOFU	$$TFSWFS
#PU
 
Ŏ ⹠ᑡ 
Ŏ ዗ኄ֝⎛ 
ŏ
17 
㔃கਦͺդᴰ	
 
Ŏ %FOJBMPG4FSWJDF 
Ŏ  
Ŏ ㍱᳐⇌	FKFDU
CFFQ
 
Ŏ  
Ŏ ᎣᣳὈ᷒	ฆ༄ᏼጥ
 
Ŏ  
	
^CJOTMFFQ]TCJOTMFFQ]VTSCJOTMFFQ 
	
^CJOFKFDU
	
^FDIPF=B 
	
^ZVNZVQEBUFCBTIBQUHFUZVQEBUFCBTISFCPPU
خ㌆㡯 
} ⋴⶷⮇ў㎄഻஥ዄ⪁๲ᵛ ⼡഻୥ࢯኅ⋴⶷⮇ў˒ 
18 
$(*ළͣⱽ㐩 
Ŏ Ἅأ⿶↸዗ኄỉગష 
Ŏ 㘓ాώक़ಅტᦡᡂͻ 
Ŏ 71/ 
Ŏ 8FCDDFMFSBUPS 
Ŏ /4 
Ŏ .BJMTFSWFS 
FUDŏ
Ṫ㟏 
Ϯᖱ᫗☱භЎᐎࣞɗධЪ↫ɗҠς㑒 
●ᏼጥCBTI㦎۟໅໅༚ḂΤ⎛⹜ⰬԆ 
⋴⶷⮇ўṦպ̥ዕ㖉خ㌆⏻
20 
∺ђ㦑⎛⹜ⰬԆ܌ؐ 
4IFMMTIPDL຺㔂
2/1Ӷٷ٣஠ቖᇨ 
⍮Ⱅⶳጓ 
֞ܠ2/1чᷗ⓱	QPSUPOMZ
 
֤ᐊܠ/4 
ܠώक़㕚㐖ͻ 
܌౉ᝒ᲻㦑 
21 
ഀፄቭϘส 
 
ጚ㍛㐷㋳˅
ͅᔉ㑊㌆ 
⾾⿧⎛⹜ⰬԆỉᦡᡂ؍ᷗ㦎 
㘓ా⸬Ϟᦉ⾾Ϯᖱ֝ざ⎛⹜ 
㌷ʾֲ㍙㡽ˎ㎄ဌ።⋴⶷⮇ў⿂።QBUDIٶʾ
23 
ᓪђΧ 
๲⑸ྻ࿞%)$1Ўᐎࣞ࿪ᒜ⿏⎸чᷗ⓱
24 
%)$1கဆℑ 
ᔜϨ͡㦑ᶁ਴ⴳዾ 
%)$1ЎᐎࣞԖ֜΍܃ዾ	EEJUJPOBM0QUJPO
 
ᐆ⬦౲ؐᶁ਴ⴳዾͻ 
ᔜϨΧ㦑ৎ⫤CBTI 
ᒙα%)$1ాႮ↸ᐆԖᅅϝ⍤CBTIৎ⫤
Shellshock 威脅案例
26 
各作業系統 DHCP 連線受影響之概況ᐄ໏᣼ⱒᎇ㍹㦑 
04 7FSTJPO 7VMOFSBCMF 
$FOU04  :4 
%FCJBO  :4 
'FEPSB  :4 
6CVOUV -54 :4 
6CVOUV -54 :4 
OESPJE  /0 
QQMFJ04  /0 
'SFF#4%  /0 
(FOUPP  /0	මҎ໢
 
-JOVY.JOU ʼn2JBOBŊ$JOOBNPO /0 
-JOVY.JOU %FCJBO$JOOBNPO /0 
.BD049  /0 
PQFO464  /0 
4ZOPMPHZ VQEBUF /0	මҎ໢
27 
㔃கਦͺդᴰ 
Ŏ ᦉ⾾֝⎛ 
 क़⬦዗㏱ỉᙜࣞͧ๲⑸ྻ࿞%)$1 
Ўᐎࣞ 
 ể⾵ᛦ㘵Ⱆ⥣ⴸ֝⎛Ⴔᐊᙜࣞጩ⎸ 
 ֝⎛ᙜࣞㄒጥⲚឡ*1㗣ͧͻᄪ 
 ᦉ⾾ગㄔ֝⎛ᙜࣞ	⿆෤፽ᐄ㚙ᛈ㏗
28 
ᓪђͦ 
␟⿧(JU4VCWFSTJPOЎᐎࣞỉTIFMM㏗ؕ
29 
(JU4VCWFSTJPO4FSWFSPWFS44) 
Ŏ ܌ؐ㏗ؕ㦎ᬔ᠎ӛગざ׷ᅅϝ 
ᷗ'PSDF$PNNBOE㏗ؕчᷗ⓱
30 
44)ͥ፦࠵ 
ᔜϨ͡㦑ᶁ਴ⴳዾ 
TTINZTTITFSWFSDPNNBOE 
! 
44)⿏⎸ᎇDPNNBOE܃ዾᐆ⬦ఎ႔ᶁ਴ⴳ 
ዾ44)@03*(*/-@$0../% 
ᔜϨΧ㦑ৎ⫤CBTI 
⌍⍮㔑ⰬTIFMM᫗CBTIᎇ㦎⿏⎸໏☱ٳࠝٳ 
CBTI
31 
዗ኄḅ㒘Ⴆॎ
32 
㔃கਦͺդᴰ 
Ŏ ␟⿧44)Ўᐎࣞ㏗ؕ 
Ŏ ܋໔⌍⍮ኆЪᛈ㏗	য໏㍫
 
Ŏ ↦܋ɗ#PUOFU	ܲأ
33 
ᓪђभ 
዗ኄ.BJMЎᐎࣞ	RNBJM
34 
RNBJMͥ፦࠵ 
ᔜϨ͡㦑ᶁ਴ⴳዾ 
౔Ҋᎇઑ㔈ዾӇఎ႔ᶁ਴ⴳዾ㦎ђ૏౔Ϩ⓱ 
ᔜϨΧ㦑ৎ⫤CBTI 
૏ᑷЎᐎࣞⰬ఺क़౔Ϩᎇчᷗ঍ॣҊ⿧ᩕ⼌ 
㚕ɗぢϨ؃⫵∫ᴑ⼌㚕⇳ᷗؐCBTIỉℨ๿㦎 
ಙܟϞ؍ᷗ
影⽚片網址 http://youtu.be/fxJBmruP0wQ
36 
㔃கਦͺդᴰ 
Ŏ ܋໔⌍⍮ኆЪᛈ㏗	য໏㍫
 
Ŏ ↦܋ႴᐊぢϨⶳጓ 
Ŏ #PUOFUɗ዗ኄ֝⎛ŏ	ܲأ
௠ቒᱪ 
዗ኄчᷗ$(*ỉ⎛㔄Ўᐎࣞ 
๲⑸ྻ࿞%)$1Ўᐎࣞ࿪ᒜ⿏⎸чᷗ⓱ 
␟⿧(JU4VCWFSTJPOЎᐎࣞỉTIFMM㏗ؕ 
዗ኄ.BJMЎᐎࣞ	RNBJM
 
37
38 
ऱၥ΍⿬
39 
ᏼጥ⌍⍮CBTI☶ᐄጥᯕ㦎ͷ㎬᠝፽݇ 
ᐊ໏⑂ᏼጥ㦊4IFMMTIPDLႪ᪪ώक़๮⑂㦋 
⿧ᩕю᥃㦊*15BCMFT
*%4
8'㦋㦎㏄ 
∺⿶↸዗ኄ 
⌍⍮ຘڠ㦎㏈ኅྻ࿞ᅅϝৎ⫤㦎ђ૏ч 
ᷗ4-JOVY
40 
4-JOVY㏈ኅчᷗྻ࿞ᅅϝ
41 
ಉ⍓
42 
㘓ా؍ᷗ4IFMMTIPDLᦡᡂ܋໔⌍⍮ኆЪᛈ㏗ɘ 
⾾⿧$(*ɗ%)$1ɗ44)⇳⿁໑࿪ᒜɘ 
Ἅأ㘓ాώक़ಅტ֦ϒ؍ᷗ㣟㦎4IFMMTIPDL 
ମ▕ᓪђ〔ᐆᏼઑɘ 
͡α⎛⹜ⰬԆ૏/4෤⬦чᷗ⓱༚Ḃ㦎፽㚙 
ۗ㐖⒢㦎ⲚϮᖱٛຘᚇᒩɘ 
๲ⴢႴᐊVOYᶁ਴ᷔ޹↧ۙᏼጥCBTIɘ 
㔑Ⱅᐆᐊᏼઑ㘓ాჶ֜CBTI۱ଁ⁃ᚇ⯏ɘ
5IBOLT
2㦈ͨہ✝
Shellshock 威脅案例

Mais conteúdo relacionado

Destaque

HITCON TALK 技術解析 SWIFT Network 攻擊
HITCON TALK 技術解析 SWIFT Network 攻擊 HITCON TALK 技術解析 SWIFT Network 攻擊
HITCON TALK 技術解析 SWIFT Network 攻擊 Hacks in Taiwan (HITCON)
 
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28Shang Wei Li
 
Android Hook - Xposed Framework (Elven Liu)
Android Hook - Xposed Framework (Elven Liu)Android Hook - Xposed Framework (Elven Liu)
Android Hook - Xposed Framework (Elven Liu)HITCON GIRLS
 
被遺忘的資訊洩漏 / Information Leakage in Taiwan
被遺忘的資訊洩漏 / Information Leakage in Taiwan被遺忘的資訊洩漏 / Information Leakage in Taiwan
被遺忘的資訊洩漏 / Information Leakage in TaiwanShaolin Hsu
 
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)HITCON GIRLS
 
HITCON GIRLS: CTF 介紹 (小魚&念奇)
HITCON GIRLS: CTF 介紹 (小魚&念奇)HITCON GIRLS: CTF 介紹 (小魚&念奇)
HITCON GIRLS: CTF 介紹 (小魚&念奇)HITCON GIRLS
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON GIRLS
 
HITCON TALK 台灣駭客協會年度活動簡介
HITCON TALK 台灣駭客協會年度活動簡介HITCON TALK 台灣駭客協會年度活動簡介
HITCON TALK 台灣駭客協會年度活動簡介Hacks in Taiwan (HITCON)
 
HITCON GIRLS 成大講座 密碼學(阿毛)
HITCON GIRLS 成大講座 密碼學(阿毛)HITCON GIRLS 成大講座 密碼學(阿毛)
HITCON GIRLS 成大講座 密碼學(阿毛)HITCON GIRLS
 
HITCON GIRLS 成大講座 惡意程式分析(Turkey)
HITCON GIRLS 成大講座 惡意程式分析(Turkey)HITCON GIRLS 成大講座 惡意程式分析(Turkey)
HITCON GIRLS 成大講座 惡意程式分析(Turkey)HITCON GIRLS
 
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)HITCON GIRLS
 

Destaque (15)

HITCON TALK ATM 金融攻擊事件解析
HITCON TALK ATM 金融攻擊事件解析HITCON TALK ATM 金融攻擊事件解析
HITCON TALK ATM 金融攻擊事件解析
 
HITCON TALK 技術解析 SWIFT Network 攻擊
HITCON TALK 技術解析 SWIFT Network 攻擊 HITCON TALK 技術解析 SWIFT Network 攻擊
HITCON TALK 技術解析 SWIFT Network 攻擊
 
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
 
Android Hook - Xposed Framework (Elven Liu)
Android Hook - Xposed Framework (Elven Liu)Android Hook - Xposed Framework (Elven Liu)
Android Hook - Xposed Framework (Elven Liu)
 
被遺忘的資訊洩漏 / Information Leakage in Taiwan
被遺忘的資訊洩漏 / Information Leakage in Taiwan被遺忘的資訊洩漏 / Information Leakage in Taiwan
被遺忘的資訊洩漏 / Information Leakage in Taiwan
 
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
HITCON GIRLS: Android 滲透測試介紹 (Elven Liu)
 
HITCON GIRLS: CTF 介紹 (小魚&念奇)
HITCON GIRLS: CTF 介紹 (小魚&念奇)HITCON GIRLS: CTF 介紹 (小魚&念奇)
HITCON GIRLS: CTF 介紹 (小魚&念奇)
 
HITCON GIRLS Malware Analysis
HITCON GIRLS Malware AnalysisHITCON GIRLS Malware Analysis
HITCON GIRLS Malware Analysis
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽
 
CTF 經驗分享
CTF 經驗分享CTF 經驗分享
CTF 經驗分享
 
HITCON TALK 台灣駭客協會年度活動簡介
HITCON TALK 台灣駭客協會年度活動簡介HITCON TALK 台灣駭客協會年度活動簡介
HITCON TALK 台灣駭客協會年度活動簡介
 
HITCON GIRLS 成大講座 密碼學(阿毛)
HITCON GIRLS 成大講座 密碼學(阿毛)HITCON GIRLS 成大講座 密碼學(阿毛)
HITCON GIRLS 成大講座 密碼學(阿毛)
 
HITCON GIRLS 成大講座 惡意程式分析(Turkey)
HITCON GIRLS 成大講座 惡意程式分析(Turkey)HITCON GIRLS 成大講座 惡意程式分析(Turkey)
HITCON GIRLS 成大講座 惡意程式分析(Turkey)
 
HITCON TALK 產業視野下的 InfoSec
HITCON TALK 產業視野下的 InfoSecHITCON TALK 產業視野下的 InfoSec
HITCON TALK 產業視野下的 InfoSec
 
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
 

Semelhante a Shellshock 威脅案例

Crowd-Powered Parameter Analysis for Visual Design Exploration (UIST 2014)
Crowd-Powered Parameter Analysis for Visual Design Exploration (UIST 2014)Crowd-Powered Parameter Analysis for Visual Design Exploration (UIST 2014)
Crowd-Powered Parameter Analysis for Visual Design Exploration (UIST 2014)Yuki Koyama
 
Biw learning in the new normal
Biw learning in the new normalBiw learning in the new normal
Biw learning in the new normalJohnMoor5
 
GraphView のすゝめ / Introduction of GraphView
GraphView のすゝめ / Introduction of GraphViewGraphView のすゝめ / Introduction of GraphView
GraphView のすゝめ / Introduction of GraphViewMori Tetsuya
 
Go for web
Go for webGo for web
Go for webWeng Wei
 
AmbientのデータをNoodlで受信して可視化してみた
AmbientのデータをNoodlで受信して可視化してみたAmbientのデータをNoodlで受信して可視化してみた
AmbientのデータをNoodlで受信して可視化してみたAmbientData
 
&DPO $SPTT 4FDUJPO.VMUJQMF 3FHSFTTJPO1SPG +BTPO .docx
&DPO  $SPTT 4FDUJPO.VMUJQMF 3FHSFTTJPO1SPG +BTPO .docx&DPO  $SPTT 4FDUJPO.VMUJQMF 3FHSFTTJPO1SPG +BTPO .docx
&DPO $SPTT 4FDUJPO.VMUJQMF 3FHSFTTJPO1SPG +BTPO .docxmayank272369
 
[JSUG SpringOne 2021 報告会]見えてきたSpring 6.0の方向性
[JSUG SpringOne 2021 報告会]見えてきたSpring 6.0の方向性[JSUG SpringOne 2021 報告会]見えてきたSpring 6.0の方向性
[JSUG SpringOne 2021 報告会]見えてきたSpring 6.0の方向性ikeyat
 
Koşuyolu Koru Evleri - Eng.pdf
Koşuyolu Koru Evleri - Eng.pdfKoşuyolu Koru Evleri - Eng.pdf
Koşuyolu Koru Evleri - Eng.pdfListing Turkey
 
モダンAngularJS @ GDG中国2014.12.6
モダンAngularJS @ GDG中国2014.12.6モダンAngularJS @ GDG中国2014.12.6
モダンAngularJS @ GDG中国2014.12.6Okuno Kentaro
 
Better ties better sales
Better ties better salesBetter ties better sales
Better ties better salesJohnMoor5
 
表現学習時代の生成語彙論ことはじめ
表現学習時代の生成語彙論ことはじめ表現学習時代の生成語彙論ことはじめ
表現学習時代の生成語彙論ことはじめYuya Unno
 
ASSEMBLEA GENERALE ANDIL 2014
ASSEMBLEA GENERALE ANDIL 2014ASSEMBLEA GENERALE ANDIL 2014
ASSEMBLEA GENERALE ANDIL 2014ANDIL_laterizi
 
What's New in Spring Boot 2.5
What's New in Spring Boot 2.5What's New in Spring Boot 2.5
What's New in Spring Boot 2.5ikeyat
 
Dennis John Paul of NZ Struc
Dennis John Paul of NZ StrucDennis John Paul of NZ Struc
Dennis John Paul of NZ StrucFingerPointer
 
GPME - Administração e análise de custos
GPME - Administração e análise de custosGPME - Administração e análise de custos
GPME - Administração e análise de custosRicardo Barboza da Silva
 
Affari e finanza pag 39 del 28 novembre 2016
Affari e finanza pag 39 del 28 novembre 2016Affari e finanza pag 39 del 28 novembre 2016
Affari e finanza pag 39 del 28 novembre 2016Guido Pezzin
 

Semelhante a Shellshock 威脅案例 (20)

Crowd-Powered Parameter Analysis for Visual Design Exploration (UIST 2014)
Crowd-Powered Parameter Analysis for Visual Design Exploration (UIST 2014)Crowd-Powered Parameter Analysis for Visual Design Exploration (UIST 2014)
Crowd-Powered Parameter Analysis for Visual Design Exploration (UIST 2014)
 
Biw learning in the new normal
Biw learning in the new normalBiw learning in the new normal
Biw learning in the new normal
 
GraphView のすゝめ / Introduction of GraphView
GraphView のすゝめ / Introduction of GraphViewGraphView のすゝめ / Introduction of GraphView
GraphView のすゝめ / Introduction of GraphView
 
Coding Guidelines
Coding GuidelinesCoding Guidelines
Coding Guidelines
 
Go for web
Go for webGo for web
Go for web
 
AmbientのデータをNoodlで受信して可視化してみた
AmbientのデータをNoodlで受信して可視化してみたAmbientのデータをNoodlで受信して可視化してみた
AmbientのデータをNoodlで受信して可視化してみた
 
&DPO $SPTT 4FDUJPO.VMUJQMF 3FHSFTTJPO1SPG +BTPO .docx
&DPO  $SPTT 4FDUJPO.VMUJQMF 3FHSFTTJPO1SPG +BTPO .docx&DPO  $SPTT 4FDUJPO.VMUJQMF 3FHSFTTJPO1SPG +BTPO .docx
&DPO $SPTT 4FDUJPO.VMUJQMF 3FHSFTTJPO1SPG +BTPO .docx
 
[JSUG SpringOne 2021 報告会]見えてきたSpring 6.0の方向性
[JSUG SpringOne 2021 報告会]見えてきたSpring 6.0の方向性[JSUG SpringOne 2021 報告会]見えてきたSpring 6.0の方向性
[JSUG SpringOne 2021 報告会]見えてきたSpring 6.0の方向性
 
Koşuyolu Koru Evleri - Eng.pdf
Koşuyolu Koru Evleri - Eng.pdfKoşuyolu Koru Evleri - Eng.pdf
Koşuyolu Koru Evleri - Eng.pdf
 
モダンAngularJS @ GDG中国2014.12.6
モダンAngularJS @ GDG中国2014.12.6モダンAngularJS @ GDG中国2014.12.6
モダンAngularJS @ GDG中国2014.12.6
 
Better ties better sales
Better ties better salesBetter ties better sales
Better ties better sales
 
Ttake Mandrini 01
Ttake Mandrini 01Ttake Mandrini 01
Ttake Mandrini 01
 
表現学習時代の生成語彙論ことはじめ
表現学習時代の生成語彙論ことはじめ表現学習時代の生成語彙論ことはじめ
表現学習時代の生成語彙論ことはじめ
 
ASSEMBLEA GENERALE ANDIL 2014
ASSEMBLEA GENERALE ANDIL 2014ASSEMBLEA GENERALE ANDIL 2014
ASSEMBLEA GENERALE ANDIL 2014
 
What's New in Spring Boot 2.5
What's New in Spring Boot 2.5What's New in Spring Boot 2.5
What's New in Spring Boot 2.5
 
Dennis John Paul of NZ Struc
Dennis John Paul of NZ StrucDennis John Paul of NZ Struc
Dennis John Paul of NZ Struc
 
Thesis
ThesisThesis
Thesis
 
US-40
US-40US-40
US-40
 
GPME - Administração e análise de custos
GPME - Administração e análise de custosGPME - Administração e análise de custos
GPME - Administração e análise de custos
 
Affari e finanza pag 39 del 28 novembre 2016
Affari e finanza pag 39 del 28 novembre 2016Affari e finanza pag 39 del 28 novembre 2016
Affari e finanza pag 39 del 28 novembre 2016
 

Último

Generalities about NFT , as a new technology
Generalities about NFT , as a new technologyGeneralities about NFT , as a new technology
Generalities about NFT , as a new technologysoufianbouktaib1
 
Benefits of Fiber Internet vs. Traditional Internet.pptx
Benefits of Fiber Internet vs. Traditional Internet.pptxBenefits of Fiber Internet vs. Traditional Internet.pptx
Benefits of Fiber Internet vs. Traditional Internet.pptxlibertyuae uae
 
Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Eric Johnson
 
Google-Next-Madrid-BBVA-Research inv.pdf
Google-Next-Madrid-BBVA-Research inv.pdfGoogle-Next-Madrid-BBVA-Research inv.pdf
Google-Next-Madrid-BBVA-Research inv.pdfMaria Adalfio
 
SQL Server on Azure VM datasheet.dsadaspptx
SQL Server on Azure VM datasheet.dsadaspptxSQL Server on Azure VM datasheet.dsadaspptx
SQL Server on Azure VM datasheet.dsadaspptxJustineGarcia32
 
Tungsten Webinar: v6 & v7 Release Recap, and Beyond
Tungsten Webinar: v6 & v7 Release Recap, and BeyondTungsten Webinar: v6 & v7 Release Recap, and Beyond
Tungsten Webinar: v6 & v7 Release Recap, and BeyondContinuent
 
如何办理朴茨茅斯大学毕业证书学位证书成绩单?
如何办理朴茨茅斯大学毕业证书学位证书成绩单?如何办理朴茨茅斯大学毕业证书学位证书成绩单?
如何办理朴茨茅斯大学毕业证书学位证书成绩单?krc0yvm5
 
overview of Virtualization, concept of Virtualization
overview of Virtualization, concept of Virtualizationoverview of Virtualization, concept of Virtualization
overview of Virtualization, concept of VirtualizationRajan yadav
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...hasimatwork
 

Último (10)

Generalities about NFT , as a new technology
Generalities about NFT , as a new technologyGeneralities about NFT , as a new technology
Generalities about NFT , as a new technology
 
Benefits of Fiber Internet vs. Traditional Internet.pptx
Benefits of Fiber Internet vs. Traditional Internet.pptxBenefits of Fiber Internet vs. Traditional Internet.pptx
Benefits of Fiber Internet vs. Traditional Internet.pptx
 
Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019
 
Google-Next-Madrid-BBVA-Research inv.pdf
Google-Next-Madrid-BBVA-Research inv.pdfGoogle-Next-Madrid-BBVA-Research inv.pdf
Google-Next-Madrid-BBVA-Research inv.pdf
 
SQL Server on Azure VM datasheet.dsadaspptx
SQL Server on Azure VM datasheet.dsadaspptxSQL Server on Azure VM datasheet.dsadaspptx
SQL Server on Azure VM datasheet.dsadaspptx
 
Tungsten Webinar: v6 & v7 Release Recap, and Beyond
Tungsten Webinar: v6 & v7 Release Recap, and BeyondTungsten Webinar: v6 & v7 Release Recap, and Beyond
Tungsten Webinar: v6 & v7 Release Recap, and Beyond
 
如何办理朴茨茅斯大学毕业证书学位证书成绩单?
如何办理朴茨茅斯大学毕业证书学位证书成绩单?如何办理朴茨茅斯大学毕业证书学位证书成绩单?
如何办理朴茨茅斯大学毕业证书学位证书成绩单?
 
overview of Virtualization, concept of Virtualization
overview of Virtualization, concept of Virtualizationoverview of Virtualization, concept of Virtualization
overview of Virtualization, concept of Virtualization
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
 

Shellshock 威脅案例