Development of Environments for Trainings Aimed at Digital Forensics

Total Page:16

File Type:pdf, Size:1020Kb

Development of Environments for Trainings Aimed at Digital Forensics Masaryk University Faculty of Informatics Development of Environments for Trainings Aimed at Digital Forensics Master’s Thesis Vadim Janovskij Brno, Spring 2018 Replace this page with a copy of the official signed thesis assignment anda copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Vadim Janovskij Advisor: RNDr. Daniel Kouřil, Ph.D. i Acknowledgements I would like to thank my advisor RNDr. Daniel Kouřil, Ph.D., for his guidance, ideas and all the time spent with providing me a valuable feedback. iii Abstract The aim of this thesis is to create tools which will be used for build- ing the simulated MS Windows corporate environment suitable for forensics training. The environment created in such way is parameteri- zable, allows generation of forensics footprints. The created framework includes tools for building the infrastructure, injecting the security incidents and generating user’s activity in the systems. The first part of the thesis identifies important forensics areasin MS Windows environment and demonstrates the possible scenario, which enables the effective teaching of important forensics principles and areas. It also compares available orchestration tools and picks one best suitable for thesis needs. The second part describes the designed technical implementation, deployment process, populating environment with the data and in- jecting cybersecurity incidents. iv Keywords Digital forensics, Training, Windows, Security incident, Desire State Configuration v Contents Introduction 1 1 Background 3 1.1 Digital Forensics .......................3 1.2 KYPO – Cyber Exercise and Research Platform. .......4 2 Designing training aimed at Digital Forensics 5 2.1 Training overview .......................5 2.2 Demonstration Scenario ...................6 2.3 Designing environment architecture .............9 2.3.1 Domain Controller . .9 2.3.2 Microsoft Exchange . 11 2.3.3 Microsoft Internet Information Services (IIS) . 11 2.3.4 Microsoft SQL Server . 11 2.3.5 File Share Server . 12 3 Designing semi-automated deployment process of the envi- ronment 13 3.1 Comparison of selected configuration management tools ... 13 3.1.1 Pupet . 14 3.1.2 Ansible . 15 3.1.3 Windows Desired State Configuration (DSC) . 15 3.1.4 Summary . 16 3.2 Understanding Desired State Configuration ......... 17 3.2.1 Modes of deployment . 17 3.2.2 DSC Architecture Overview . 18 3.3 Designing solution ...................... 21 3.3.1 Powershell DSC scripts structure . 21 3.3.2 Deployment process . 22 4 Building the environment 25 4.1 Prerequisites .......................... 25 4.2 Domain Controller ...................... 26 4.2.1 Join nodes to domain . 27 4.2.2 Configuring shared storages . 28 4.3 Internet Information Services (IIS) Server .......... 30 vii 4.4 Microsoft SQL Server ..................... 30 4.5 Exchange Server ........................ 31 4.6 Windows Workstations .................... 32 5 Populating environment with the scenario data 35 5.1 Adding users, groups, and organizational units ....... 35 5.2 Deploying web application .................. 37 5.3 Simulation of users actions .................. 40 6 Security incidents injection 43 6.1 Password guessing ...................... 45 6.2 Phishing email ........................ 46 6.3 Malware injection ....................... 49 6.4 Theft of sensitive information ................. 52 6.5 Disruption of company’s information services ........ 53 7 Conclusion 55 Bibliography 57 A Attachments 61 viii List of Tables 2.1 Typical types of servers present in organization. 10 3.1 Summary of tools comparison. 16 4.1 An overview of virtual machines involved in demonstration scenario. 25 ix List of Figures 2.1 General structure of the training. 6 2.2 Stark Industries - Organization Chart. 8 2.3 Design of the environment architecture. 10 3.1 Desire State Configuration Architecture Overview. 18 3.2 Final DSC scripts structure. 22 3.3 Environment deployment process. 24 5.1 Organizational units and groups structure. 36 5.2 nopCommerce Installation page. 39 6.1 Attacks implemented in our sample Scenario. 44 xi Introduction Every organization must be prepared for the possibility of cybercrime within its network or on its computer systems. An organization should have employees who can recognize crimes like fraud, insider threat, industrial espionage, employees misuse, and computer intrusion. Such employees do not need to understand all technical aspects in depth, but they should be able to determine the severity of the crime correctly and in important cases escalate it to the forensics professionals. Every system administrator should learn how to extract key evidence from the Windows systems. Forensic artifacts are sensitive data that could be easily erased by improper actions. Without proper education of IT professionals in this area, companies risking irreversibly lost forensics evidence and never identify the guilty persons. Education in the environment that simulates a real computer net- work with realistic scenario has been shown as highly effective. It motivates the participants, and they are more involved in the educa- tion process. With the growth of virtualization technologies and cloud comput- ing simulation of such environment is much more simpler, scalable and realistic. Moreover today with the orchestration tools we are able to automate the whole deployment process and build such environ- ment with just a few scripts. The purpose of this thesis is to combine available deployment au- tomation tools, and scripting to build environments aimed at Digital Forensics with minimum human interaction needed. Design the sce- nario that will cover basic forensics areas in MS Windows environment and with automation scripts simulate a malicious activity that will leave forensic traces. The thesis is divided into seven chapters. Chapter 2 starts with describing digital forensics and provides reasons why it is beneficial for organizations to have forensically trained employees. Then the KYPO Cyber Exercise platform is introduced. Chapter 3 describe the design of the environment building process. It provides a comparison of selected configuration management tool and specifies reasons why I have decided to use the solution from Microsoft. Then it describes aspects of the selected technology and provides the design of the 1 deployment process. Chapter 4 illustrates the steps of the deployment process and introduce configuration scripts that have been created. Chapter 5 introduce the process of populating the environment with users and data. It is an important aspect because before injecting the security incidents our training environment need to contain users and data that will be compromised. Chapter 6 describes the injection of the security incidents and analyze the forensic footprints that have been generated in the systems. Chapter 7 summarize the main contribution of this thesis and suggests recommendations for further work. 2 1 Background In this Chapter, we will say what is digital forensics and why it is important for organizations to have employees trained in this area. Then we will present KYPO - Cyber Exercise Platorm, the place where we will deploy our training environment and list benefits that it will bring to us. 1.1 Digital Forensics Forensics[1] is a science of collecting, analyzing and reporting on digital data in a way that can be presented as evidence. The forensic investigator collects forensic artifacts, try to build relations between them and get the whole picture about the incident. Here is an example of forensic artifacts that can be found on a Windows systems: ∙ NFTS and file system ∙ Windows prefetch files ∙ Event logs ∙ Windows Shadow copies ∙ Registry ∙ Memory forensics The results of the forensic investigation can be either presented in a court or stayed internally in a corporation. Today a lot of forensic inves- tigations are not shared with law enforcement, and they stay internal inside the corporation. Organizations do the forensic investigation to understand what kind of breach they had and what information was leaked. With the increasing number of cybersecurity incidents, the need for computer forensics is growing. Having an IT team that is forensically trained can bring the following benefits to the organization: ∙ Save the organization money and time. The organization will not need to outsource basic forensics investigations but could solve it with its own IT department. 3 1. Background ∙ Identify the compromise of important systems faster. ∙ Minimize the disruption of organization’s daily business activi- ties during a forensic investigation. 1.2 KYPO – Cyber Exercise and Research Platform. Our training environment will be based on the KYPO platform [2]. KYPO is being developed at Masaryk University. It provides a virtual- ized environment in a cloud that allows simulation of large networks, systems, services, and applications.Compare to a standard cloud en- vironment, KYPO will bring to our training environment additional benefits: ∙ KYPO provides Windows virtual machines and takes care of the proper network configuration. ∙ The environment is isolated from the outside world, and all con- nections are monitored. Because we are going to inject security incidents to our environment, our systems should have vulnera- bilities. KYPO
Recommended publications
  • DIR-ESS-TGOV-SVCS-254 Exhibit 4.5 Third Party Contracts
    State of Texas Department of Information Resources Texas.gov Services Exhibit 4.5 Third Party Contracts DIR-ESS-TGOV-SVCS-254 Page 1 of 10 Texas Department of Information Resources Third-Party Contracts - Software Entry Number of Respondent License Reference Vendor Software Product Name Description Licenses (if Assume (A) or Comment Transferable? Number applicable) Displace (D) SW001 MongoDB mongoDB A free and open-source cross-platform document-oriented database program. Yes A Classified as a NoSQL database program, MongoDB uses JSON-like documents with schemas. SW002 activiti Activiti is an open-source workflow engine written in Java that can execute Yes A business processes described in BPMN 2.0 SW003 Red Hat Red Hat Linux Server Red Hat Enterprise Linux (RHEL) is a Linux distribution developed by Red Hat 20 Yes A and targeted toward the commercial market SW004 Melissa Data Corp Melissa Data Lookups for ZIP Codes, maps, ZIP+4, Carrier Routes, addresses, reverse 1 Yes A phone, IP location, SIC codes, street names, property info and much more SW005 Oracle Oracle WebLogic Suite Oracle WebLogic Suite is an integrated solution for building on-premise cloud 4 Processors. 60 Yes A application infrastructures that span web server, application server and data Users. grid technology tiers. SW006 Oracle Oracle SOA Suite for Oracle Middleware Oracle SOA Suite is a comprehensive, standards-based Middleware Users Yes A software suite to build, deploy and manage integration following the concepts 30. WebLogic Suite of service-oriented architecture (SOA). Users 30. SW007 Symantec Symantec EndPoint Symantec Endpoint Protection, developed by Symantec, is a security software 243 Yes A suite, which consists of anti-malware, intrusion prevention and firewall features for servers and desktops.
    [Show full text]
  • Comparative Studies of 10 Programming Languages Within 10 Diverse Criteria
    Department of Computer Science and Software Engineering Comparative Studies of 10 Programming Languages within 10 Diverse Criteria Jiang Li Sleiman Rabah Concordia University Concordia University Montreal, Quebec, Concordia Montreal, Quebec, Concordia [email protected] [email protected] Mingzhi Liu Yuanwei Lai Concordia University Concordia University Montreal, Quebec, Concordia Montreal, Quebec, Concordia [email protected] [email protected] COMP 6411 - A Comparative studies of programming languages 1/139 Sleiman Rabah, Jiang Li, Mingzhi Liu, Yuanwei Lai This page was intentionally left blank COMP 6411 - A Comparative studies of programming languages 2/139 Sleiman Rabah, Jiang Li, Mingzhi Liu, Yuanwei Lai Abstract There are many programming languages in the world today.Each language has their advantage and disavantage. In this paper, we will discuss ten programming languages: C++, C#, Java, Groovy, JavaScript, PHP, Schalar, Scheme, Haskell and AspectJ. We summarize and compare these ten languages on ten different criterion. For example, Default more secure programming practices, Web applications development, OO-based abstraction and etc. At the end, we will give our conclusion that which languages are suitable and which are not for using in some cases. We will also provide evidence and our analysis on why some language are better than other or have advantages over the other on some criterion. 1 Introduction Since there are hundreds of programming languages existing nowadays, it is impossible and inefficient
    [Show full text]
  • Adam Tornhill — «Your Code As a Crime Scene
    Early praise for Your Code as a Crime Scene This book casts a surprising light on an unexpected place—my own code. I feel like I’ve found a secret treasure chest of completely unexpected methods. Useful for programmers, the book provides a powerful tool to smart testers, too. ➤ James Bach Author, Lessons Learned in Software Testing You think you know your code. After all, you and your fellow programmers have been sweating over it for years now. Adam Tornhill uses thinking in psychology together with hands-on tools to show you the bad parts. This book is a red pill. Are you ready? ➤ Björn Granvik Competence manager Adam Tornhill presents code as it exists in the real world—tightly coupled, un- wieldy, and full of danger zones even when past developers had the best of inten- tions. His forensic techniques for analyzing and improving both the technical and the social aspects of a code base are a godsend for developers working with legacy systems. I found this book extremely useful to my own work and highly recommend it! ➤ Nell Shamrell-Harrington Lead developer, PhishMe By enlisting simple heuristics and data from everyday tools, Adam shows you how to fight bad code and its cohorts—all interleaved with intriguing anecdotes from forensic psychology. Highly recommended! ➤ Jonas Lundberg Senior programmer and team leader, Netset AB After reading this book, you will never look at code in the same way again! ➤ Patrik Falk Agile developer and coach Do you have a large pile of code, and mysterious and unpleasant bugs seem to appear out of nothing? This book lets you profile and find out the weak areas in your code and how to fight them.
    [Show full text]
  • MAGENTO E-Commerce Services
    MAGENTO E-Commerce Services Do you want to take your business to the next level by getting exposed to the powerful Web? Want to launch a professional e-commerce website with extensive functionalities? Magento is the answer to your question. An open source Ecommerce application platform with robust features, scalability and flexibility that guarantees enhanced reach on products and quick return on investment for your business. AES Magento Ecommerce development services help your business grow better. Our Magento Application Development team provides solutions based on strategic business objectives to add more value to your business. Our Magento Customization Services not just make your site simple to manage but also ensures that your retail site is uniquely designed to meet the needs of client and to make it every shoppers dream. Give us your credence and we will be the backbone to your online business! The Magento Services we offer Magento Online retail Store Development Magento Customization Magento Template Design and Integration Magento based Themes creation and Integration Custom Model Development in Magento PSD to Magento conversions Magento Developer/Team for Hiring Value added Services Site management & maintenance SEO Implementation Site Optimization and reporting Google Analytics Hosting Solutions Social Media Integration Magento Development Services Magento Installation & Configuration Magento Integration Magento Customization Magento Online Store Development Magento Shopping cart Development Magento SEO Implementation Magento Module Development Magento Theme Development Magento Template Designing Magento Plug-in Development Magento Extensions Development Magento Store Migration Magento Website Maintenance Magento Consulting Magento Tutoring Technical assistance for integrating Magento Templates Debugging existing Magento Extensions, plugins & modules Enhancement of existing Magento online shops Magento Upgrading Services Get in touch with us and know more about our Magento open source development services.
    [Show full text]
  • Kahai Using Electronic Commerce Software in an Electronic Commerce Course 1 DECISION SCIENCES INSTITUTE Using Electronic Commerc
    Kahai Using Electronic Commerce Software in an Electronic Commerce Course DECISION SCIENCES INSTITUTE Using Electronic Commerce Software in an Electronic Commerce Course ABSTRACT In this paper, I describe the process of using Electronic Commerce software in the namesake course. I outline three options, point out the pros and cons of each option, then make a recommendation about the best option. KEYWORDS: Electronic Commerce, E-Commerce, Software INTRODUCTION In teaching an Electronic Commerce (E-Commerce) class as part of an Information Systems curriculum, it has become important to provide hands-on experience to E-Commerce software. At one time, having students use such software would have been nearly impossible as it was prohibitively expensive to purchase for in-class use and/or required extensive programming experience to design. In the past few years, though, many open-source and free versions of E- Commerce software that can be run on nearly every computer have become available. Examples include OpenCart, WP eCommerce, and WooCommerce among others. Some, like the latter two, have to be installed on an existing Content Management System (CMS) package like WordPress. OpenCart, on the other hand, is designed to be a standalone installation and, therefore, doesn’t require users to learn two different systems. As an academician-turned-entrepreneur, I have helped small- to mid-sized firms deploy E- Commerce software using the aforementioned and other E-Commerce packages. Increasingly, now, vendors such as GoDaddy, Shopify, eBay, and several others provide pre-configured E- Commerce packages that require few technical skills to get a fully-configured online store up and running.
    [Show full text]
  • Anurag Kumar Contact No.: +91-9990694004 (M) E-Mail: [email protected]
    Anurag Kumar Contact No.: +91-9990694004 (M) E-Mail: [email protected] Job Objective To develop my career as a Software Engineer, I intend to work in a challenging atmosphere where I will be a valuable team member, contributing quality ideas and work for an organization where there is an ample scope for organization as well as individual growth in Software Development. Professional Experience A dynamic professional with 2+ years experience in the areas of Web Development using Microsoft Technologies (ASP.Net MVC, ASP.Net, C#, SQL Server) Specialized in NopCommerce (E Commerce solution open source) and have sound understanding of e commerce domain. Currently working in Search Online Communications Pvt Ltd as a NopCommerce Developer (11 Jan 2017 to present). Previously worked with Ambient Intellect India Pvt Ltd (Jan 2016 to Jan 2017). Demonstrated abilities in software development and effective logic Implementation. Team player with strong analytical, problem solving, inter – personal skills & organisational abilities Eagerness to explore and learn. Skill set & Development tools E Commerce Solution : NopCommerce Server Side Technologies : Asp.Net Core, Asp.Net MVC, ASP.Net, C#, Entity Framework Client Side Technologies : Jquery, Javascript, Json Database : Microsoft SQL Server 2014 Operating System : Microsoft Windows XP /7/8/8.1 IDE : Visual Studio 2012, 2015, 2017 Domain Knowledge Good understanding of e commerce domain, so efficiently able to manage all the aspects of an e commerce website. Deep understanding of NopCommerce, able to utilize the default functionality till maximum point. Expert in developing the new functionalities using plug-in, so that process of updating to newest NopCommerce platform will be a piece of cake.
    [Show full text]
  • Dean-Whipple-Resume.Pdf
    Dean J. Whipple PO Box 700874 [email protected] Tulsa, Oklahoma 74170 TECHNICAL SKILLS Programming: • Angular / ASP.Net / C# / VB.Net • HTML / CSS / JavaScript / MVC / Razor / Blazor • All releases of the .Net Framework and .Net Core • LINQ / WPF / WCF / Entity Framework Databases: • MS SQL Server – All versions • MySQL / PostgreSQL / DB2 / Sybase / Oracle Tools: • Azure, AWS and Oracle Cloud Services • nopCommerce eCommerce platform • PhoneGap • Crystal Reports • Pageflex & Storefront • DotNetNuke Content Management System PROFESSIONAL EXPERIENCE Automated Business Solutions, Incorporated, Tulsa, Oklahoma Mar 2011 - Present Senior Full Stack Software Engineer - Owner (since 1990) Projects included: • Developed Survey and Tracking web application using Blazor and SQL Server • Developed K9 Training management web application in Angular 10, Web API Core and PostgreSQL • Created several custom nopCommerce plugins for multiple versions • Developed manufacturing job tracking schedule board using Angular 7, Web API and SQL Server • Developed breathalyzer testing Management web portal using AngularJS, Web API and Azure • Developed breathalyzer Kiosk application with proprietary hardware, Credit Card Reader, Fingerprint Reader, Video Camera and 2 Still Cameras using AngularJS, WCF and Compact SQL • Developed Kiosk Management System web application using AngularJS, Web API and Azure • Developed custom Kiosk application with proprietary hardware, Bill Acceptor, Credit Card Reader, Fingerprint Reader, Receipt Printer and Video/Still Camera using WPF,
    [Show full text]
  • Performance Problem Diagnostics by Systematic Experimentation
    The Karlsruhe Series on Software Design and Quality 20 Performance Problem Diagnostics by Systematic Experimentation Alexander Wert Alexander Wert Performance Problem Diagnostics by Systematic Experimentation The Karlsruhe Series on Software Design and Quality Volume 20 Chair Software Design and Quality Faculty of Computer Science Karlsruhe Institute of Technology and Software Engineering Division Research Center for Information Technology (FZI), Karlsruhe Editor: Prof. Dr. Ralf Reussner Performance Problem Diagnostics by Systematic Experimentation by Alexander Wert Dissertation, Karlsruher Institut für Technologie KIT-Fakultät für Informatik Tag der mündlichen Prüfung: 15. Juli 2015 Erster Gutachter: Prof. Dr. Ralf H. Reussner Zweiter Gutachter: Prof. Dr. Wilhelm Hasselbring Impressum Karlsruher Institut für Technologie (KIT) KIT Scientific Publishing Straße am Forum 2 D-76131 Karlsruhe KIT Scientific Publishing is a registered trademark of Karlsruhe Institute of Technology. Reprint using the book cover is not allowed. www.ksp.kit.edu This document – excluding the cover, pictures and graphs – is licensed under a Creative Commons Attribution-Share Alike 4.0 International License (CC BY-SA 4.0): https://creativecommons.org/licenses/by-sa/4.0/deed.en The cover page is licensed under a Creative Commons Attribution-No Derivatives 4.0 International License (CC BY-ND 4.0): https://creativecommons.org/licenses/by-nd/4.0/deed.en Print on Demand 2018 – Gedruckt auf FSC-zertifiziertem Papier ISSN 1867-0067 ISBN 978-3-7315-0677-5 DOI: 10.5445/KSP/1000070006 Performance Problem Diagnostics by Systematic Experimentation zur Erlangung des akademischen Grades eines Doktors der Ingenieurwissenschaften der Fakultät für Informatik des Karlsruher Instituts für Technologie genehmigte Dissertation von Alexander Wert aus Kopejsk, Russland Tag der mündlichen Prüfung: 15.
    [Show full text]
  • Integuard: Toward Automatic Protection of Third-Party Web Service Integrations
    InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations Luyi Xing, Yangyi Chen, XiaoFeng Wang Shuo Chen Indiana University Bloomington Microsoft Research Bloomington, IN, USA Redmond, WA, USA fluyixing, yangchen, [email protected] [email protected] Abstract—A web application today often utilizes web APIs to has made the web applications complicated and error-prone, incorporate third-party services into its functionality. Such API as discovered in our recent studies [1], [2]. integration, however, is full of security perils: recent studies show that popular web sites using high-profile web services, Logic flaws in web-API integrations. The unique security such as PayPal/Amazon checkouts and Facebook/Google single- challenge such a hybrid web application (i.e., those inte- sign-on (SSO) services, are riddled with logic flaws, enabling a malicious party to shop for free or log into a victim’s account. grating third-party web services) faces is how to securely To address this new threat, techniques need to be developed to coordinate different parties it involves, including the one that facilitate secure integration of third-party web services. integrates the API services (called integrator), the provider To answer this urgent call, we present in this paper of the services and the web clients using the application. InteGuard, the first system that offers security protection Our prior research shows that this is very difficult to be to vulnerable web API integrations. InteGuard operates a done securely: given the diversity in the ways that an API proxy in front of the service integrator’s web site, performing security checks on a set of invariant relations among the HTTP service is integrated and the partial view the integrator and messages the integrator receives during a transaction (e.g., a the API provider share about each other’s code and runtime checkout from a web store or a web SSO).
    [Show full text]
  • Christopher Michael Maxim Richardson, Texas 75081 – H: (214) 432-6199 E: [email protected]
    Christopher Michael Maxim Richardson, Texas 75081 – H: (214) 432-6199 E: [email protected] Objective: A position as a programmer using C# and the Microsoft .Net Framework. Summary of Skills: Languages: English (native), Spanish (7 years) Programming Languages (years): Delphi (18), C# (13), Razor/MVC3 (6), ASP.Net (12), SQL (18), Java (6), MDX (1), ECMA/JavaScript (16), HTML/5 (16), CSS (16), C/C++ (18), Pascal (22), Python (2), MDX (1), Silverlight/XAML (6), Win32 API (18), XNA (1), Ruby (1), PHP (4), TwilioML (8), VXML(2), Scheme(1), Basic (2), Assembly (Intel x86 and MIPS) (1) Frameworks & Components: Net Framework (1.1 – 4.6.2), Mono, PhantomJS, RabbitMQ, Redis, IP*Works, iText/iTextSharp, Telerik, Developer Express, Indy, Melissa Data, NCTSoft, Eldos, MindFusion, USP Express, Polar Spellchecker, many other components. Databases & Search Engines: MS SQL Server (6.5 – 2016), Oracle (10g – 11g), PostgreSQL, MySQL, Solr Operating Systems: Microsoft Windows (3.1 - 8, 2000 – 2016 Server), Linux (various), Windows Phone, MacOS, Solaris, BeOS Web Servers & Portals: IIS, Apache, SharePoint, nopCommerce, Community Server Clouds & Payment Processors: Rackspace, Amazon, Bitcoin, Litecoin, PayPal, Authorize.Net Source Control & Project Mgmt: SVN, TFS, CVS, Perforce, Visual SourceSafe, JIRA Applications: MS Office, Adobe PhotoShop, CoolEdit, many other applications Work Experience Maxim Software Development LLC (Sep 2000 – Current) Dallas, Texas Owner/Manager Started, operated, and manages a single member LLC focused on providing custom software development, technical consulting, and custom application support. Clients included Intelemedia Communications, Omnicom subsidiary M/A/R/C dba TargetBase, Bizniz Developers, Chordial Solutions, Tagelmoust LLC, and 24x8. In addition to establishing reseller channels and general business responsibilities, was responsible for designing and maintaining a variety of platforms and applications including: An object modeling and platform generation framework in C#, WCF, T-SQL, and ASP.Net with AJAX.
    [Show full text]