Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
77 views
12 pages
Cross Site Leaks Cheatsheet
Cross Site Leaks Cheatsheet
Uploaded by
Rizki Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Cross Site Leaks Cheatsheet For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
77 views
12 pages
Cross Site Leaks Cheatsheet
Cross Site Leaks Cheatsheet
Uploaded by
Rizki Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Cross Site Leaks Cheatsheet For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 12
Search
Fullscreen
XS Leaks - OWASP Cheat Sheet Series Cross-site leaks Cheat Sheet Introduction ‘This article describes examples of attacks and defenses against cross-site leaks vulnerability (XS Leaks). Since this vulnerability is based on the core mechanism of modern web browsers, it's also called a browser side-channel attack. XS-Leaks attacks seek to exploit the fact of seemingly insignificant information that is exchanged in cross-site communications between sites. This information infers answers to the previously asked questions about the victim's user account. Please take a look at the examples provided below: + Is the user currently logged in? Is the user ID 13372 + Is the user an administrator? + Does the user have a person with a particular email address in their contact list? On the basis of such questions, the attacker might try to deduce the answers, depending on the application's context. In most cases, the answers will be in binary form (yes or no). The impact of this vulnerability depends strongly on the application's risk profile. Despite this, XS Leaks may pose a real threat to user privacy and anonymity. Attack vector ‘The victim meen Wists the ‘tothe site Inthe context ofthe victim's browser and fctve sessions in the application, the Ores Sttocker ter to infer a spect state the vicim to vista ste foaged in of net. whether they have @ thet ts contoled by the Porton named ter fend et cttacker Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html ane9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series + The entire attack takes place on the victim's browser side - just like an XSS attack + In some cases, the victim must remain on the attacker's site longer for the attack to succeed. Same Origin Policy (SOP) Before describing attacks, i's good to understand one of the most critical security mechanisms in browsers - The Same-origin Policy. A few key aspects: + Two URLs are considered as same-origin if their protocol, port, and host are the same + Any origin can send a request to another source, but due to the Same-origin Policy, they will not be able to read the response directly + Same Origin Policy may be relaxed by Cross Origin Resource Sharing (CORS). Origin A Origin B Same origin? https: //exanple.com hetp://sub.example.com No-different hosts hetps://exanple.com hetps://exemple.com:443 Yes! Implicit port in Origin A ‘Although the SOP principle protects us from accessing information in cross-origin communication, XS-Leaks attacks based on residual datacan infer some information. SameSite Cookies ‘The SameStte attribute of a cookie tells the browser whether it shouldindude the cookie in the request from the other site. The SameSite attribute takes the following values: ‘* None -the cookie will be attached to a request from ancther site, but it must be sent over a ‘secure HTTPS channel + Lax -the cookie will be appended tothe request from ancther pageiif the request method is GET and the request is made to top-level navigetion (ie. the navigation changes the addressin the browser top bat) ‘© Strict -the cookie will never be sent from ancther site Itis worth mentioning here the attitude of Chromium based browsers in which cookies without ‘SameSite attribute set by default are treated as Lax. Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html ane9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Cookies with the appropriate SameSite attribute provide a strong defense against both XS Leaks and also CSRF attacks. How do we know that two sites are SameSite? eTLD https://example.com:443 eTLD+1 Inthe context of the SameSite attribute, we consider the site to be the combination of the TLD (top- level domain) and the domain name before it. For example: Fall URL Site (eTLD#1) https: //example .com:443/d example.com Why are we talking about eTLD#1 and nct just TLD+17 Its because of domains tke .9ithub-io or eu.org . Such parts are nat atomic enough to be compared well. For this reason, alist of effective’ TLDs (eTLDs) was created and can be found here. Sites that have the sameeTLD+1 are considered SameSte, examples: Origin A Origin B SameSite? https: //exanple.com http: //example.con Yes, schemes dorit matter https://evil net https: //exanple.con No differenteTLD+1 hetps://sub.example.co tts: //data.example.co Yes, subdomains dontt a ® matter For mote information about SamSite, see the excellent article Understanding "same-site’. Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html az9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Attacks using the element ID attribute Elements in the DOM can have an ID attribute that is unique within the dooument. For example button id="pro">Pro account The browser will automatically focus on an element with a given ID if we append a hash to the URL, 9, https://exanple..con#pro. What'smote JavaScript focus event gets fired The attacker may try to embed the application in the iframe with specific source on its own controlled page: ©©@ hpsottackercom
1frane> then add listener in main document for blur event (the opposite of focus). When the victim visits the attackers site, the blur event gets fired. The attacker will be able toconclude that the victim has pro account. Defense Framing protection Ifyou dorttneed other origins to embed your application in a frame, you can consider using one of ‘two mechanisms: ‘+ Content Security Policy frame ancestors directive. Read more about syntax. ‘+ X¢Frame-Options - mainly if you want to support old browsers. Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html ana9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Setting up framing protection efficiently blocks the ability 1o embed your application in a frame on the attacker-controlled origin and protects from other attacks like Clickjacking. Fetchmetadata (Sec-Fetch-Dest) Sec-FetchyDest header provides us witha piece of information about what is the end goal of the request. This header is included automatically by the browser and is one of the headers within the Fetch Metadeta standard. With Sec-Fetch-Dest you can buld effective cwn resource isolation policies, for example: app.get('/', (req, res) => { if (req.get('Sec-Fetch-Dest') === ‘iframe’) { return res.sendStatus(403) ; > res.send({ message: ‘Hello! v: Di frame (example.comftest) Forbidden example.com Sec-Fetch-Dest: iframe oo App: Server 403 Forbidden Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html siz9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series If you want to use headers from the Fetch Metadata standard, make sure that your users’ browsers ‘support this standard (you can check it here). Also, think about using the appropriate fallback in code if the Sec-Fetch-* header is not included in the request. Attacks based on error events Embedding from resources from other origins is generally allowed. For example, you can embed an image from another origin or even script on your page. What is not permitted is reading cross- origin resource due the SOP policy. When the browser sends a request for a resource, the server processes the request and decides on the response e.g. (200 OK or 404 NOT FOUND). The browser receives the HTTP response and based on that, the appropriate JavaScript event is fired (onload or onerror) In this way, we can try to load resources and, based on the response status, infer whether they exist or not in the context of the logged:in victim. Let's look at the following situation: + GET /api/user/1234 -2000K - currently logged-in user is 1234 because we successfully hoaded resource (onload event fred) «GET /api/user/1235 -401 Unauthorized - 1235 is nct the ID of the currently loggedin user (onerror event will be triggered) Given the above example. an attacker can use JavaScript on his controlled origin to guess the victims ID by enumerating overall the values in a simple loop. function checkId(id) { const script = docunent .createElenent(' script’); script.sre = “https://exanple.con/api/users/${id)” ; script-onload = () => { console. log( Logged user id: S(id}*); a docunent .bedy.appendchs1d(seript) ; + // Generate array [8, const ids = Array(41) f() smap((-, 4) very 40) +0); for (const id of ids) { checkTd( 3d); Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Note that the attacker here does not care about reading the response body even though it would not be able to dve to solid isolation mechanisms in browsers such as Cross-Origin Resource Blocking. Allit needs is the success information it receives when the onload event fres. Defense ‘SubResource protection In some cases, mechanism of special unique tokens may be implemented to protect our sensitive endpoints. Japi /users/12342token=be93@b8cfbS01 12b9803024200130003 + Token should be long and unique + The backend must correctly validate the token passed in therequest Although it is pretty effective, the solution generates a significant averhead in proper implementation. Fetchmetadata (Sec-Fetch-Site) ‘This header specifies where the request was sent from, and it takes the follow + cross-site © sene-origin © sane-site + none -user directly reached the page Like Seo-Fetch-Dest, this header is automatically appended by the browser to each request and is part of the Fetch Metadata standard. Example usage’ app.get('/api/users/:id', authorization, (req, res) => { Af (req.get('Sec-Fetch-Site') === ‘cross-site') { return res.sendStatus(49a) ; } H/ +++ wore code return res.send({ id: 1234, name: ‘John’, role: ‘admin’ }); YD: Ctoss-Origin-Resource-Policy (CORP) Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html m29723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series If the serverretums this header with the appropriate value, the browser will not load resources from our site or origin (even static images) in ancther application. Possible values: © sane-site © seme-origin © cross-origin Read more about CORP here. Attacks on postMessage communication Sometimes in controlled situations we would like despite SOP to exchange information between different origins. We can use the postMessage mechanism. See below example: // Origin: http://example.con const site = new URLSearchParans(wincow.location.search) .get("site’); // https://evil.com const popup ~ window.open(site); popup.posthessage( secret message! // Origin: https://evil.com window.addEventListener('message’, e alert(e.data) // secret message! Dd: Defense Specify strict targetOrigin ‘To avoid situations like the one above, Where an attacker manages to get the reference for a windowto receive amessage, always specify theexact target0rigin inpostMessage. Passing to the torgetorigin wildcard * causes any origin to receive the message. = http: //example.can 1ew URLSearchParans(window.location.search) .get(‘site’); // https: //evil.com const popup = window.open(site); popup.postMessage( ‘secret message! https: //sub.example com’); // Origin: https://evil.com window.addéventListener('message’, e alert(e.data) // no data! yi Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html anz9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series Frame counting attacks Information about the number of loaded frames in a window can be a source of leakage. Take for example an application that loads search results into a frame. if the results are empty then the frame does nct appear. 000 mpemanpeconenaeuamarniocttnistananysecon Lresult found No results found > window. frames. Aengeh i > window. frames. Length 4 ‘An attacker can get information about the number of loaded frames in a windew by counting the number of frames ina window.franes otject. So finally, an attacker can obtain the email lst and, ina simple loop, open subsequent windows and count the number of frames. If the number of frames in the opened window is equal to 1, the email isin the client's detabase of the application used by the victim. Defense Cross-Origin-Opener-Policy (COOP) Setting this header will prevent cross-otigin documents from opening in the same browsing context group. This solution ensures that document A opening anather document will net have access to the window object. Possible values: © unsafe-none © sane-origin-allow-popups Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html ennXS Leaks - OWASP Cheat Sheet Series In case the server returns for example sane-origin COOP header, the attack fails: const win = window.open( https: //example.con/admin/custoners? search=john'4Gexample.com’); console-log(win.frames.length) // Cannot read property ‘length’ of null Attacks using browser cache Browser cache helps to significantly reduce the time it takes for a page to load when revisited, However, it can also pose a risk of information leakage. If an attacker is able to detect whether a resource was loaded from the cache after the load time, he will be able to draw some conclusions based on it. ‘The principle is simple, a resource loaded from cache memory will load incomparably faster than from the server. @©@ https:fattacker.com
‘An attacker can embed a resource on their site that is only accessible to a user with the admin role. ‘Then, using JavaScript, read the load time of a particular resource and, based on this information, deduce whether the resource is in cache or not. // Threshold above which we consider 2 resource to have loaded fram the server // const THRESHOLD = ... const adminImagePerfEntry = window.performance Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html sone9723122, 9:02AM XS Leaks - OWASP Cheat Sheet Series -getEntries() -filter((entry) => entry.name.endsWith( 'admin.svg')); if (adminimagePerfentry.duration < THRESHOLD) { console, 1og('Image loaded from cache! ') + Defense Unpredictable tokens for images This technique is accurate when the user wants the resources to still be cached, while an attacker will not be able to find out about it. Javatars/adnin.svg?token=be93@bdcTbS071eb%a030242ac130003 + Tokens should be unique in context of each user + Ifan attacker cannot guess this token, it will not be able to detect whether the resource was loaded from cache Using the Cache-Control header You can disable the cache mechanism if you accept the degraded performance related to the necessity of reloading resources from the server every time a user visits the site. To disable caching for resources you want to protect, set the response header Cache-Control: no-store. Quick recommendations «+ your application uses cookies, make sure to set the appropriate SameSite attribute, ‘Think about whether youreally want to allow your application to be embedded in frames. tf nct, consider using the mechanisms described in the framing protection section + To strengthen the isolation of your application between other origins, use Cross Origin Resource Policy and Cross Origin Opener Policy headers with appropriate values. ‘* Use the headers available within Fetch Metadsta to build your own resource isolation pol References XS Leaks XS Leaks Wiki Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html sineXS Leaks - OWASP Cheat Sheet Series XS Leaks Attacks & Prevention Fetch Metadata ‘* Fetch Metadata and Isolation Policies ‘Protect your resources from attacks with Fetch Metadata Framing protection ‘+ Preventing framing with policies ‘CSP frame-ancestors' policy SameSite ‘© SameSite cookies explained ‘* SameSite cookies recipes COOP and CORP header ‘* Making your site ‘cross-origin isolated” ‘¢ MDN Web Docs about CORP Intps:itcheatshectseries.owasp.orgicheatsheetsXS_Leaks Cheat Sheet html
You might also like
Q16 Lecture PDF
PDF
No ratings yet
Q16 Lecture PDF
34 pages
I Id Insider Threat: ISACA, Mumbai Chapter
PDF
100% (1)
I Id Insider Threat: ISACA, Mumbai Chapter
53 pages
Tinywow Iot Lab Manual 6768835
PDF
No ratings yet
Tinywow Iot Lab Manual 6768835
33 pages
DI - Natl Security and Tech Regulation
PDF
No ratings yet
DI - Natl Security and Tech Regulation
20 pages
Texas-General Soil Map-2008
PDF
No ratings yet
Texas-General Soil Map-2008
2 pages
Harnessing Artificial Intelligence For The Earth Report 2018
PDF
No ratings yet
Harnessing Artificial Intelligence For The Earth Report 2018
28 pages
W1 - Lecture - Vectors - Part 1 (Updated)
PDF
No ratings yet
W1 - Lecture - Vectors - Part 1 (Updated)
39 pages
Theory of Architecture at The First Machine Age: Sejarah & Teori Arsitektur Dunia
PDF
No ratings yet
Theory of Architecture at The First Machine Age: Sejarah & Teori Arsitektur Dunia
123 pages
(Abstract) Semantics
PDF
No ratings yet
(Abstract) Semantics
48 pages
Dom
PDF
No ratings yet
Dom
24 pages
2017-08 Analytic Success Stories - Results of A Business Case Seminar
PDF
No ratings yet
2017-08 Analytic Success Stories - Results of A Business Case Seminar
20 pages
Data Science Africa AI Researchers Kick-Off Unilag 2019 PDF
PDF
No ratings yet
Data Science Africa AI Researchers Kick-Off Unilag 2019 PDF
103 pages
Measure of Central Tendency Project
PDF
No ratings yet
Measure of Central Tendency Project
86 pages
L1 Oe6980 PDF
PDF
No ratings yet
L1 Oe6980 PDF
165 pages
Web Security: Part 1
PDF
No ratings yet
Web Security: Part 1
46 pages
Nodejs Security Cheatsheet
PDF
No ratings yet
Nodejs Security Cheatsheet
18 pages
ABES IDC Estudo Mercado Brasileirode Software 2023 v02 Previa
PDF
No ratings yet
ABES IDC Estudo Mercado Brasileirode Software 2023 v02 Previa
55 pages
Material Report Packages 10
PDF
No ratings yet
Material Report Packages 10
28 pages
The Last Word 10/2022
PDF
No ratings yet
The Last Word 10/2022
10 pages
XML External Entity Prevention Cheatsheet
PDF
No ratings yet
XML External Entity Prevention Cheatsheet
18 pages
Lab 4 MCSE - 207 - Suyash
PDF
No ratings yet
Lab 4 MCSE - 207 - Suyash
25 pages
Laravel Cheatsheet
PDF
No ratings yet
Laravel Cheatsheet
13 pages
Big Bash League Final Full Assignment
PDF
No ratings yet
Big Bash League Final Full Assignment
24 pages
Mint Delhi 28-10-2022
PDF
No ratings yet
Mint Delhi 28-10-2022
20 pages
Coleman Report 151.6DP
PDF
No ratings yet
Coleman Report 151.6DP
73 pages
Comprehensive Guide On Dirb Tool
PDF
No ratings yet
Comprehensive Guide On Dirb Tool
20 pages
Uptown Shuttle Brochure
PDF
No ratings yet
Uptown Shuttle Brochure
2 pages
Secret Management Cheatsheet
PDF
100% (1)
Secret Management Cheatsheet
22 pages
Mu Sigma Times 2012
PDF
No ratings yet
Mu Sigma Times 2012
25 pages
NN VI Two-Pager
PDF
100% (1)
NN VI Two-Pager
2 pages
Xss Filter Evasion Cheatsheet
PDF
No ratings yet
Xss Filter Evasion Cheatsheet
32 pages
17mtcs068-Lab Manual
PDF
No ratings yet
17mtcs068-Lab Manual
15 pages
Meeting 2 - Penyajian Materi 2
PDF
No ratings yet
Meeting 2 - Penyajian Materi 2
3 pages
Logging Vocabulary Cheatsheet
PDF
No ratings yet
Logging Vocabulary Cheatsheet
26 pages
82191C Brochure APPL ADV200-HVAC EN
PDF
No ratings yet
82191C Brochure APPL ADV200-HVAC EN
20 pages
An Experimental Evaluation of Similarity-Based and Embedding-Based Link Prediction Methods On Graphs
PDF
No ratings yet
An Experimental Evaluation of Similarity-Based and Embedding-Based Link Prediction Methods On Graphs
18 pages
B205B Final Exam Focus
PDF
No ratings yet
B205B Final Exam Focus
20 pages
GBG Idscan Ieos Web API v4
PDF
No ratings yet
GBG Idscan Ieos Web API v4
16 pages
XML Security Cheatsheet
PDF
No ratings yet
XML Security Cheatsheet
22 pages
Lpu Internship Presentation
PDF
No ratings yet
Lpu Internship Presentation
29 pages
Session Management Cheatsheet
PDF
No ratings yet
Session Management Cheatsheet
20 pages
Evolution of Indian Banking
PDF
No ratings yet
Evolution of Indian Banking
5 pages
Nevada Highways Map (2010)
PDF
No ratings yet
Nevada Highways Map (2010)
187 pages
JSON Web Token Cheatsheet For Java
PDF
No ratings yet
JSON Web Token Cheatsheet For Java
14 pages
Third Party Javascript Management Cheatsheet
PDF
No ratings yet
Third Party Javascript Management Cheatsheet
11 pages
Injection Prevention Cheatsheet
PDF
No ratings yet
Injection Prevention Cheatsheet
11 pages
Tirana River Waterfront Development Prop PDF
PDF
No ratings yet
Tirana River Waterfront Development Prop PDF
15 pages
RBI Releases Its IT Vision Document For 2011-17
PDF
100% (1)
RBI Releases Its IT Vision Document For 2011-17
2 pages
Xss Prevention
PDF
No ratings yet
Xss Prevention
10 pages
Virtual Patching Cheatsheet
PDF
No ratings yet
Virtual Patching Cheatsheet
10 pages
Digital Economy and Sustainable Use of Resources A Case Study of Saudi Arabia
PDF
No ratings yet
Digital Economy and Sustainable Use of Resources A Case Study of Saudi Arabia
9 pages
Exame 1 PDF
PDF
No ratings yet
Exame 1 PDF
3 pages
REST Security Cheatsheet
PDF
No ratings yet
REST Security Cheatsheet
9 pages
TLS Cipher String Cheatsheet
PDF
0% (1)
TLS Cipher String Cheatsheet
2 pages
Transport Layer Protection Cheatsheet
PDF
No ratings yet
Transport Layer Protection Cheatsheet
9 pages
Input Validation Cheatsheet
PDF
No ratings yet
Input Validation Cheatsheet
9 pages
Ruby On Rails Cheatsheet
PDF
No ratings yet
Ruby On Rails Cheatsheet
13 pages
Practice Paper 1 - Class 12 (2021)
PDF
No ratings yet
Practice Paper 1 - Class 12 (2021)
15 pages
Pinning Cheat Sheet
PDF
No ratings yet
Pinning Cheat Sheet
8 pages
The Impact of Indias Cyber Security Law and Cyber Forensic On Building Techno-Centric Smartcity IoT Environment
PDF
No ratings yet
The Impact of Indias Cyber Security Law and Cyber Forensic On Building Techno-Centric Smartcity IoT Environment
9 pages
B2 Ciclo 2 - WB
PDF
No ratings yet
B2 Ciclo 2 - WB
9 pages
Firmas Palo Alto
PDF
No ratings yet
Firmas Palo Alto
5 pages
Case 2 - Kristina First Research Draft Proposal
PDF
No ratings yet
Case 2 - Kristina First Research Draft Proposal
6 pages
Impacts of Climate Change On Area and Production Under Different Crops in Bhandara District Central India
PDF
No ratings yet
Impacts of Climate Change On Area and Production Under Different Crops in Bhandara District Central India
10 pages
SQL Injection Prevention Cheatsheet
PDF
No ratings yet
SQL Injection Prevention Cheatsheet
14 pages
Password Storage Cheatsheet
PDF
No ratings yet
Password Storage Cheatsheet
7 pages
Mass Assignment Cheatsheet
PDF
No ratings yet
Mass Assignment Cheatsheet
7 pages
Bradley Soc 201 CRN 41664 Summer 2020
PDF
No ratings yet
Bradley Soc 201 CRN 41664 Summer 2020
7 pages
HIST342 Exercise 10
PDF
No ratings yet
HIST342 Exercise 10
5 pages
Density Heat Capacity and Thermal Conductivity of Liquid Egg Products
PDF
No ratings yet
Density Heat Capacity and Thermal Conductivity of Liquid Egg Products
6 pages
Bagisto Packaging Best Practices
PDF
No ratings yet
Bagisto Packaging Best Practices
9 pages
Insecure Direct Object Reference
PDF
No ratings yet
Insecure Direct Object Reference
6 pages
SAML Security Cheatsheet
PDF
No ratings yet
SAML Security Cheatsheet
6 pages
Server Side Request Forgery Prevention Cheatsheet
PDF
No ratings yet
Server Side Request Forgery Prevention Cheatsheet
12 pages
Se Srs Practical File
PDF
No ratings yet
Se Srs Practical File
22 pages
Threat Modeling Cheatsheet
PDF
No ratings yet
Threat Modeling Cheatsheet
12 pages
Bakos Simracing DIY Active H-Shifter - User Manual v4
PDF
No ratings yet
Bakos Simracing DIY Active H-Shifter - User Manual v4
5 pages
Webtop Software: Transforming The Desktop With Personalized Web-Based Applications
PDF
No ratings yet
Webtop Software: Transforming The Desktop With Personalized Web-Based Applications
2 pages
GovTech Social Contract Agenda
PDF
No ratings yet
GovTech Social Contract Agenda
3 pages
Sdu Lab Assignment: 1. Component Diagram For Online Examination Registration System
PDF
No ratings yet
Sdu Lab Assignment: 1. Component Diagram For Online Examination Registration System
4 pages
GRI2009 EBrochure
PDF
No ratings yet
GRI2009 EBrochure
27 pages
PHP Configuration Cheatsheet
PDF
No ratings yet
PHP Configuration Cheatsheet
3 pages
2018 Microprocessor Optimizations For The IOT
PDF
No ratings yet
2018 Microprocessor Optimizations For The IOT
14 pages
02 Engineering Professionalism PDF
PDF
No ratings yet
02 Engineering Professionalism PDF
13 pages
Cgillenwater Resume
PDF
No ratings yet
Cgillenwater Resume
2 pages
CAD Techniques Porfolio Exercise 7
PDF
No ratings yet
CAD Techniques Porfolio Exercise 7
2 pages
Roadmap of Python
PDF
No ratings yet
Roadmap of Python
3 pages