搜索
SANS SEC588 - Cloud penetration testing-2022
磁力链接/BT种子名称
SANS SEC588 - Cloud penetration testing-2022
磁力链接/BT种子简介
种子哈希:
034ae514f08dcb1bd93f9801c70a4cca73fbb255
文件大小:
2.57G
已经下载:
3776
次
下载速度:
极快
收录时间:
2023-12-22
最近下载:
2025-12-28
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:034AE514F08DCB1BD93F9801C70A4CCA73FBB255
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
母狗园
51动漫
91短视频
抖音Max
海王TV
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
91暗网
最近搜索
stella+cox
st petersburg teen
复古四级
二龙潭女主角戚化怡
pes+2025+smoke+patch
鸭总探花经典作之黑裙少妇2部完整版☀️精致少妇颜值高+情趣高跟更显骚!多少有点看对眼+全程高跟带笑脸
yuzuto
jm+comic
こもも
www.98t.la
格尔发
pervdriver+tommy+king
mackenzie+page++
冷血人狼
肉丸屋
julia+ann
乱伦
rabbit
[度盘]【完整版】推特新晋海王淫妻约炮原创博主「icicis」单男约老师无套内射,骚话连篇
换妻
soilwork
sneakysex.17.10.28.adriana.chechik
jean michel jarre
kid-043
邓紫晴
欧美古代老片
胖爷的奇妙
前后变化
ipz408
换妻界
文件列表
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/7. LAB 33 AZURE VMS.mp4
107.5 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/22. LAB 46 PEIRATES LAB.mp4
106.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/13. LAB 13 PORTSCANS IN THE CLOUD.mp4
82.5 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/9. LAB 43 COMMAND LINE INJECTIONS.mp4
81.7 MB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/2. CAPSTONE EVENT RULES.mp4
79.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/8. LAB 14 FINDING SECRETS IN GIT.mp4
72.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/8. LAB 37 POSTMAN AND MICROSOFT GRAPH API.mp4
70.2 MB
SEC588 PDF/SEC588 Book hide01.cyou @SansPentest linuxia.ir.pdf
64.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/16. LAB 45 SQL INJECTIONS.mp4
61.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/10. LAB 12 CLOUD DISCOVERY LAB.mp4
58.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/9. LAB 22 AWS CLI TOUR.mp4
55.4 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/12. LAB 24 AMAZON IAM PRIVILEGE ESCALATIONS PART 1.mp4
53.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/8. LAB 44 SERVERLESS ATTACKS.mp4
53.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/14. LAB 15 DATABASES AND EXPOSED PORTS.mp4
52.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/7. LAB 23 MAPPING WITH COMMONSPEAK2.mp4
51.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/16. LAB 52 BACKDOORING CONTAINERS.mp4
43.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/7. LAB 25 AMAZON IAM PRIVILEGE ESCALATIONS PART 2.mp4
40.1 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/15. LAB 21 HTTP AND POSTMAN TOUR.mp4
39.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/7. LAB 32 APIS AND POSTMAN.mp4
37.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/7. LAB 41 ABUSING CICD PIPELINES.mp4
37.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/10. LAB 56 SOCKET AND OS REDIRECTIONS .mp4
35.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/7. LAB 36 WINDOWS CONTAINERS LAB.mp4
33.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/15. LAB 51 LIGHTWEIGHT AND HEAVYWEIGHT WEBSHELLS.mp4
32.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/12. LAB 26 PACU LABS.mp4
32.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/13. LAB 55 C2 REDIRECTIONS.mp4
32.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/9. LAB 11 ACCESSING OUR CLOUD ASSETS.mp4
31.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/8. LAB 16 EYEWITNESS IN THE CLOUD.mp4
31.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/9. LAB 42 SSRFS.mp4
31.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/18. LAB 31 AZURE AD AND RBAC ROLES.mp4
30.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/9. LAB 35 RUNNING COMMANDS ON VMS.mp4
30.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/5. LAB 53 USERNAME AND PIVOT SETUP.mp4
29.6 MB
SEC588 PDF/SEC588 Workbook hide01.cyou @SansPentest linuxia.ir.pdf
28.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/14. LAB 54 CREDENTIAL STUFFING AND PASSWORD.mp4
26.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/6. LAB 34 ATTACKING AZURE FUNCTIONS.mp4
23.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/1. Discovery Recon and Architecture at Scale.mp4
8.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/5. AMAZON ARN.mp4
8.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/2. MAPPING AND DISCOVERING SUBDOMAINS AND ROUTES.mp4
7.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/1. Azure and Windows Services in the Cloud.mp4
7.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/2. DATABASES IN CLOUD ENVIRONMENTS.mp4
7.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/19. SAML.mp4
7.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/4. KMS ENCRYPTDECRYPT BEHAVIOR.mp4
7.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/11. TIPS MAPPING IN AWS AND AZURE.mp4
6.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/4. TIPS AND TRICKS DOMAINS INTERNET DATA DOWNLOAD.mp4
6.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/9. UNDERSTANDING FILESYSTEMS IN THE CLOUD.mp4
6.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/10. AWS METADATA SESSION TOKENS V2.mp4
6.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/4. WORKING WITH AWS SERVICES.mp4
6.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/7. WINRM.mp4
5.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/4. FILES SECRETS FORMAT.mp4
5.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/5. INTRODUCTION TO MICROSOFT CLOUD SERVICES.mp4
5.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/2. TABLE OF CONTENTS 1.mp4
5.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/3. FINDING VALID DOMAINS WITH DOMAIN HUNTER.mp4
5.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/3. HIGHLEVEL VIEW OF IDENTITY IN MICROSOFT.mp4
5.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/4. WHY OAUTH.mp4
5.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/2. PORT SCANNING AT WEBSCALE.mp4
5.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/6. COMPARISON OF SERVICE NAMES BETWEEN EACH PROVIDERS.mp4
5.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/5. EXPLOITS IN LAMBDA SOFTWARE.mp4
5.2 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/4. IDENTITY TYPES ON AWS.mp4
5.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/16. RBAC EXAMPLE.mp4
5.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/6. COMMAND INJECTION AND CLOUD NATIVE.mp4
5.1 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/5. IAM POLICY EXAMPLE.mp4
5.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/15. HTTP REQUEST REVIEW HTML.mp4
5.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/6. ENV EXAMPLE.mp4
5.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/9. UNIQUE PROPERTIES OF CLOUD COMPUTING.mp4
4.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/3. DISCOVERING EXPOSED SERVICES.mp4
4.9 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/3. CONTAINERS AND APPLICATION DEPLOYMENT.mp4
4.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/2. WINDOWS CONTAINERS.mp4
4.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/5. ATTACKERS VIEW OF WINDOWS CONTAINERS.mp4
4.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/2. CNCF TRAILMAP.mp4
4.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/2. AWS LAMBDA FUNCTIONS.mp4
4.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/2. MICROSOFT GRAPH INTRODUCTION.mp4
4.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/3. LEVERAGE CSP NETWORKING OPTIONS.mp4
4.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/8. WHY CLOUD PENETRATION TESTING.mp4
4.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/2. AZURE VMS.mp4
4.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/7. ON PREMISE AZURE AND AWS ROLE COMPARISONS.mp4
4.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/4. URIS URLS URNS.mp4
4.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/8. DIFFICULTY IN BLOCKING CLOUD SERVICE PROVIDERS.mp4
4.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/5. CERTIFICATES REVIEW.mp4
4.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/10. CLOUD COMPUTING PROPERTIES.mp4
4.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/3. SURFACE AREA INCREASE TIPS AND TRICKS DOMAINS.mp4
4.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/6. USING THE GRAPH API FOR SEARCH.mp4
4.4 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/7. COMBINING JQ AND AWS.mp4
4.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/4. SSRF DISCOVERY.mp4
4.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/7. SURFACE AREA INCREASE TIPS AND TRICKS CERTIFICATE TRANSPARENCY.mp4
4.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/3. NGROK OPTIONS.mp4
4.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/3. AWS CLI OPTIONS.mp4
4.1 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/5. COMMONSPEAK2 EXAMPLE OF SUBDOMAIN QUERY.mp4
4.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/5. WINDOWS CONTAINERS AND MIMIKATZ.mp4
4.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/2. GOLDEN SAML.mp4
4.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/8. AZURE ACTIVE DIRECTORY DOMAIN SERVICES.mp4
4.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/7. DOCKERFILE.mp4
4.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/5. EXAMPLE SCRIPTS.mp4
4.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/8. SERVERLESS INTRO.mp4
4.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/4. MAJOR DIFFERENCES BETWEEN LINUX AND WINDOWS CONTAINERS.mp4
4.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/8. DOMAIN FRONTING METHODOLOGY.mp4
4.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/2. AMAZON IAM.mp4
3.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/2. CLASSIC PRIVILEGE ESCALATIONS.mp4
3.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/2. AWS SDK.mp4
3.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/16. HTTP REQUEST REVIEW JSON.mp4
3.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/7. ABOUT THIS COURSE.mp4
3.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/2. APPLICATION DEPLOYMENT STRATEGIES.mp4
3.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/4. COMMONSPEAK2 COMMANDS.mp4
3.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/10. NMAP NSE.mp4
3.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/9. PACU EVASIONS.mp4
3.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/3. IAM AND PRIVILEGE ESCALATION ISSUES.mp4
3.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/7. ATTACKING PLATFORM AS A SERVICE.mp4
3.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/5. HOW CLOUD APPLICATIONS TALK CLOUD NATIVE.mp4
3.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/7. OAUTH V1 TERMINOLOGY.mp4
3.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/4. AZURE FILES.mp4
3.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/2. CHALLENGES WITH TRADITIONAL PAYLOADS.mp4
3.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/7. FINDING COMMAND INJECTIONS.mp4
3.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/7. MASSCAN WORKFLOW.mp4
3.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/6. AZURE ACTIVE DIRECTORY.mp4
3.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/16. JAVASCRIPT WEB TOKENS.mp4
3.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/13. SQLMAP EXAMPLES.mp4
3.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/4. EXECUTING COMMANDS THROUGH RUNCOMMAND.mp4
3.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/3. DOCKER AND WINDOWS.mp4
3.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/2. DEVELOPER WORKFLOW.mp4
3.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/3. CUSTOM SCRIPT EXTENSION.mp4
3.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/8. DNSRECONPY OUTPUT AND LARGE LISTS.mp4
3.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/9. MAPPING THE TOTAL INFRASTRUCTURE.mp4
3.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/3. SANS CLOUD PENETRATION TESTING METHODOLOGY.mp4
3.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/5. UNDERSTANDING CONTAINERS DOCKER.mp4
3.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/4. AWS LAMBDA EXAMPLE.mp4
3.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/9. AZURE LOGIN OPTIONS.mp4
3.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/3. MICROSOFT GRAPH CONSTRAINTS.mp4
3.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/14. APPLICATION MAPPING VS INFRASTRUCTURE MAPPING.mp4
3.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/5. DEMARCATION POINTS IN A PUBLIC CLOUD ENVIRONMENT.mp4
3.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/3. ATTACKERS VIEW OF URIS AND RFC 3986.mp4
3.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/4. PUBLIC CLOUD ASSESSMENTS.mp4
3.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/7. CONNECTING TO CLOUD DATABASES.mp4
3.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/13. OPENID CONNECT.mp4
3.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/10. FLOW TYPES.mp4
3.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/6. CLOUD NATIVE APPLICATIONS.mp4
3.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/2. A WORD ON CLOUD ARCHITECTURES AND FEATURES.mp4
3.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/11. TYPES OF CLOUDS.mp4
3.4 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/12. POSTMAN FEATURE AUTHORIZATION.mp4
3.4 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/10. TIPS FOR INFRASTRUCTURE MAPPING 1.mp4
3.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/2. BACKDOORING CONTAINERS.mp4
3.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/6. AWS IAM VISUALIZED.mp4
3.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/3. POSTMAN.mp4
3.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/9. NMAP TOUR.mp4
3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/2. SERVERLESS COMPUTING COMPUTE RUNTIMES.mp4
3.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/4. ATTACKING SERVERLESS FUNCTIONS.mp4
3.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/2. AZURE SERVERLESS.mp4
3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/3. BUILD SYSTEMS.mp4
3.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/6. DOMAIN FRONTING.mp4
3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/7. SQL INJECTION VISUALIZED IN NODEJS 1.mp4
3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/5. WHY FOCUS ON WEB APPLICATIONS.mp4
3.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/7. SERVICE ORCHESTRATION KUBERNETES.mp4
3.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/4. PAYLOAD RENAISSANCE.mp4
3.2 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/8. AWS INSTANCE METADATA SERVICE.mp4
3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/2. SSRFS.mp4
3.2 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/10. PACU ADVANCED USAGE.mp4
3.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/5. MICROSOFT ACTIVE DIRECTORY FEDERATED SERVICES.mp4
3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/4. EXPLOITING COMMAND INJECTIONS.mp4
3.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/4. MASSCAN SCAN OPTIONS 1.mp4
3.1 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/3. PACU INTERFACE.mp4
3.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/7. SSRFS IN THE WILD.mp4
3.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/8. WEB SHELLS.mp4
3.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/5. Web Application Injections hide01.cyou @SansPentest linuxia.ir/2. INJECTIONS.mp4
3.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/6. DNSRECONPY.mp4
3.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/4. SOCAT ADDRESS FORMAT.mp4
3.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/3. ATTACKERS VIEW OF WINDOWS FUNCTIONS.mp4
3.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/2. TABLE OF CONTENTS I.mp4
2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/17. ATTACKERS VIEW OF JWTS.mp4
2.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/5. SOCAT EXAMPLES.mp4
2.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/3. UNDERSTANDING CONTAINERS RUNC.mp4
2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/5. OAUTH AND BEARER AUTHENTICATION.mp4
2.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/3. AMAZON KMS USE CASES.mp4
2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/4. WORKING WITH DISKS IN AZURE.mp4
2.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/10. USING VALID CERTIFICATES IN METASPLOIT.mp4
2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/3. VIRTUAL MACHINES COMMON COMMANDS.mp4
2.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/9. THE ATTACKERS VIEW OF PUBLIC IAAS VISUALIZED.mp4
2.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/2. AMAZON KMS.mp4
2.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/9. POLICIES FOR SERVICES.mp4
2.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/6. PACU ENUMERATION MODULES.mp4
2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/7. AZURE ACTIVE DIRECTORY ROLES.mp4
2.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/5. MASSCAN TESTING THEORETICAL LIMITS.mp4
2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/3. MAPPING AZURE URLS 2.mp4
2.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/12. TIPS FOR INFRASTRUCTURE MAPPING 2.mp4
2.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/5. ATTACKING CICD TOOLS.mp4
2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/2. VISUALIZATIONS DURING RECON.mp4
2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/5. SUBSET OF USEFUL STRINGS TO SEARCH FOR.mp4
2.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/4. NODEJS LAMBDA EXAMPLE.mp4
2.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/3. AWS LAMBDA.mp4
2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/3. GOBUSTER.mp4
2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/6. ACME AND LETS ENCYPT.mp4
2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/5. GOBUSTER OUTPUT.mp4
2.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/5. CEWL AND CUSTOM WORDLISTS.mp4
2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/3. GIT.mp4
2.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/4. CONTAINER ARCHITECTURES VISUALIZED LINUX.mp4
2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/7. INTRIGUE IDENT.mp4
2.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/7. IPTABLES AS A REDIRECTION TOOL.mp4
2.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/13. MAPPING VISUALIZED MULTIPLE LAYERS OF ABSTRACTION.mp4
2.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/4. DOMAIN HUNTER SYNTAX.mp4
2.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/14. SQL INJECTION DEFENSES.mp4
2.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/3. CLOUD NATIVE APPLICATION ARCHITECTURES.mp4
2.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/9. MICROSERVICES AND CLOUD NATIVE APPLICATIONS.mp4
2.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/2. MIMIKATZ.mp4
2.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/4. SHIMIT.mp4
2.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/3. AWS LAMBDA CONSTRAINTS.mp4
2.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/8. STAGED AND STAGELESS PAYLOADS.mp4
2.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/7. DNSRECONPY RUNNING DNSRECON.mp4
2.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/3. AMAZON AWS ROOT ACCOUNT.mp4
2.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/8. POLICY BOUNDARIES.mp4
2.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/7. TRAVIS CONFIGURATION FILES.mp4
2.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/3. MIMIKATZ SHELL.mp4
2.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/12. DESIGN CHOICES AND CONSIDERATION FOR PAYLOADS.mp4
2.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/4. UNDERSTANDING CONTAINERS CONTAINERD.mp4
2.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/8. THE ATTACKERS VIEW OF IAAS.mp4
2.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/5. EXECUTING LAMBDA FUNCTIONS MANUALLY.mp4
2.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/2. SANS PENETRATION TESTING CURRICULUM.mp4
2.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/7. PACU ESCALATE LATERAL MOVE.mp4
2.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/4. GOBUSTER SYNTAX.mp4
2.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/9. AWS SESSION TOKENS.mp4
2.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/8. CERTIFICATE TRANSPARENCY FOR HOST DISCOVERY.mp4
2.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/11. OAUTH V2 AUTHORIZATION CODE FLOW CLIENTSIDE.mp4
2.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/10. LIGHTWEIGHT SHELLS.mp4
2.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/4. DATABASES IN THE CLOUD.mp4
2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/2. TABLE OF CONTENTS I.mp4
2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/5. SQL INJECTION.mp4
2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/6. INTRODUCTION TO METERPRETER.mp4
2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/6. METADATAV2 TOKEN PROTECTIONS.mp4
2.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/6. MASSCAN TCP CONNECTIONS VS NMAP.mp4
2.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/9. ATTACKERS VIEW OF IDENTITY SERVICES IN AZURE.mp4
2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/2. DEPLOYMENT PIPELINES.mp4
2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/3. AMAZON RDS AND AURORA.mp4
2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/5. MOUNTING A PASSWORD SPRAYING ATTACK.mp4
2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/6. SQL INJECTION WORKFLOW.mp4
2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/9. SETTING UP BOTH STAGELESS AND STAGED METERPRETER.mp4
2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/7. EXPLOIT MULTI HANDLER.mp4
2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/9. OAUTH V2.mp4
2.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/15. RBAC.mp4
2.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/2. INTRODUCTION TO PACU.mp4
2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/6. OAUTH V1.mp4
2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/8. AZURE CLI.mp4
2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/2. MICROSOFT IDENTITY SERVICES.mp4
2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/22. ATTACKERS VIEW OF SAML.mp4
2.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/2. USERNAME HARVESTING IN THE CLOUD.mp4
2.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/9. KUBERNETES TYPES OF DEPLOYMENTS.mp4
2.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/5. KUBERNETES NODES.mp4
2.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/5. EYEWITNESS COMMAND LINE SYNTAX.mp4
2.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/4. PASSWORD LISTS AND WORDLISTS.mp4
2.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/3. GETTING PAYLOADS ONTO SYSTEMS.mp4
2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/10. ATTACKERS VIEW OF AD CONNECTOR.mp4
2.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/12. MONGODB COMMAND CHEAT SHEET.mp4
2.2 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/8. POSTMAN FEATURE COLLECTIONS.mp4
2.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/10. THCHYDRA.mp4
2.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/5. NAVIGATING THE METASPLOIT FRAMEWORK.mp4
2.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/11. SQL VS MONGODB A PRIMER.mp4
2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/7. CERTIFICATE USAGE IN KUBERNETES.mp4
2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/11. PODS.mp4
2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/4. KUBERNETES ARCHITECTURE II.mp4
2.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/13. CHOICES FOR RESTRICTIONS.mp4
2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/3. COMMAND LINE EXECUTION EXAMPLE.mp4
2.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/11. AZURE AD RBAC ROLES.mp4
2.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/2. CODE EXECUTION ON WINDOWS.mp4
2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/5. COMMAND INJECTION PRIMITIVES.mp4
2.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/5. BUYING GOOD WEB PROPERTIES FLIPPA.mp4
2.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/5. HYBRID WORKERS.mp4
2.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/18. VULNERABILITY HUNTING IN KUBERNETES.mp4
2.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/13. AZURE AD SCOPE.mp4
2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/12. BACKDOOR CONTAINER WORKFLOW.mp4
2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/11. THCHYDRA SYNTAX AND EXAMPLES.mp4
2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/10. BUILDING PAYLOADS.mp4
2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/2. OBFUSCATION OF C2 INFRASTRUCTURE.mp4
2.1 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/7. AZURE POLICIES RESTRICTIONS.mp4
2.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/12. SQLMAP AND CLOUD APPLICATIONS.mp4
2.1 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/10. IMPACT OF EXPOSING THESE INJECTIONS.mp4
2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/3. AWS CROSSACCOUNT COPIES.mp4
2.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/4. HOW APPLICATIONS TALK CLASSIC.mp4
2.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/7. RED TEAM AND THE CLOUD.mp4
2.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/5. PACU RECON MODULES UNAUTHENTICATED.mp4
2.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/11. SQLMAPPY.mp4
2.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/13. WRAPPING UP SECTION 2.mp4
2.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/5. IDENTITIES WITH AZURE FILES AND ONPREMISE SERVICES.mp4
2.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/3. MASSCAN DEFAULT SYNTAX.mp4
2.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/5. TRADITIONAL PAYLOADS FOR PENETRATION TESTING FRAMEWORKs.mp4
2.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/5. INTRIGUE DESIGN.mp4
2.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/6. CONTAINERS SIMPLIFY APP DEPLOYMENTS.mp4
2.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/2. WHY FOCUS ON AUTHENTICATION STANDARDS.mp4
2.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/10. ATTRIBUTE BASED ACCESS CONTROL.mp4
2.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/4. MICROSOFT TRADITIONAL ACTIVE DIRECTORY.mp4
2.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/20. IDENTIFYING SAML.mp4
2.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/5. PAID EXTRAS REDISLABS.mp4
1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/2. TESTING POLICIES PUBLIC CLOUD SERVICE PROVIDERS IAAS.mp4
1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/2. INTERACTING WITH BASIC INFRASTRUCTURE CLOUD COMPONENTS.mp4
1.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/3. WEB AUTHENTICATION STANDARDS.mp4
1.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/8. WINDOWS PORTPROXY.mp4
1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/2. DOMAIN ENUMERATION TOOLS.mp4
1.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/14. EXAMPLE DEPLOYMENT YAML.mp4
1.9 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/8. ATTACKERS VIEW OF THE KUBERNETES.mp4
1.9 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/6. AWS LAMBDA SHELLS.mp4
1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/4. EYEWITNESS.mp4
1.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/21. EXAMPLE SAML MESSAGE.mp4
1.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/7. IDENTITY VS RESOURCE POLICIES.mp4
1.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/2. PASSWORD ATTACK TYPES AND METHODOLOGY.mp4
1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/6. A WORD ON SQL INJECTION VS NOSQL INJECTION.mp4
1.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/6. BEACONBASED PAYLOADS.mp4
1.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/8. USING TRAVIS TO MOVE LATERALLY.mp4
1.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/4. DETECTING CICD TOOLS.mp4
1.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/8. USERNAME STRUCTURES.mp4
1.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/4. MOUNTING A DICTIONARY ATTACK.mp4
1.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/5. POSTMAN AND MICROSOFT GRAPH.mp4
1.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/6. ATTACKING SOFTWARE AS A SERVICE.mp4
1.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/3. WHY ARE SSRFS POPULAR AGAIN.mp4
1.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/4. MICROSOFT GRAPH PERMISSION EXAMPLE.mp4
1.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/17. CLIENTSIDE MAPPINGS.mp4
1.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/6. PARSING JSON OUTPUT IN CLI.mp4
1.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/2. URL PRIMERS.mp4
1.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/14. TELSA EXAMPLE.mp4
1.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/6. USING PORT PROXIES WITH BUILT IN TOOLS.mp4
1.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/9. SQL INJECTION VISUALIZED IN NODEJS 3.mp4
1.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/5. AZURE STORAGE EXPLORER AND DISM.mp4
1.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/8. PACU EXPLOITS.mp4
1.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/2. DATA PIVOTING OPTIONS.mp4
1.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/3. ASSET COLLECTION FRAMEWORKS.mp4
1.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/6. KUBERNETES ARCHITECTURE III.mp4
1.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/4. METASPLOIT.mp4
1.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/4. AWS RESTRICTIONS.mp4
1.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/13. POSTMAN FEATURE CODE.mp4
1.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/2. SANS TRADITIONAL PENETRATION TESTING METHODOLOGY.mp4
1.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/4. PACU MODULE DEPENDENCY AND PERMISSION DEPENDENCY.mp4
1.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/3. KUBERNETES ARCHITECTURE I.mp4
1.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/4. PROXYCANNONNG.mp4
1.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/9. POSTMAN FEATURE METHOD OPTIONS.mp4
1.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/8. CONTAINER CROSS COMMUNICATION.mp4
1.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/4. IAM AND USER VERSIONING 1.mp4
1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/6. MOUNTING A CREDENTIAL STUFFING ATTACK.mp4
1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/12. AZURE AD ADMINISTRATOR ROLES.mp4
1.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/8. MASSCAN FOLLOWED UP BY NMAP.mp4
1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/13. KUBERNETES AND THE PAYLOAD.mp4
1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/8. MICROSOFT ONEDRIVE.mp4
1.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/6. UNDERSTANDING CONTAINERS DOCKER HUB.mp4
1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/14. AZURE AD ROLES VIEWED.mp4
1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/3. MOUNTING A BRUTE FORCE ATTACK.mp4
1.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/6. PROCESS REVIEW.mp4
1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/9. HEAVY SHELL EXAMPLES.mp4
1.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/12. PRIVILEGED PODS.mp4
1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/4. MIMIKATZ MODULES.mp4
1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/6. HYBRID WORKERS WATCHERS.mp4
1.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/6. THE ARCHITECTURE FOR THIS SECTION.mp4
1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/3. INTRODUCTION TO SOCAT.mp4
1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/15. AZURE RBAC VS AZURE AD ADMINS VS CROSS PLATFORM ADMINS.mp4
1.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/8. MAPPING WORKFLOW.mp4
1.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4
1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/5. SHIMIT EXAMPLE.mp4
1.5 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/4. SEVERAL USE CASES.mp4
1.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/3. COMMONSPEAK2 QUERIES.mp4
1.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/4. POSTMAN LIMITATIONS ON THE FREE BUILD.mp4
1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/6. WHY DISCUSS RED TEAM.mp4
1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/3. MULTIPLE ATTACK METHODS FOR PASSWORDS.mp4
1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/11. KUBERNETES AND METERPRETER.mp4
1.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/23. SAML WORKFLOWS.mp4
1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/7. ACCOUNT ATTACK METHODOLOGY.mp4
1.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/10. POSTMAN FEATURE ENVIRONMENTS.mp4
1.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/11. MASSCAN NMAP WORKFLOW.mp4
1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/2. PASSWORDS.mp4
1.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/18. BEARER AUTHENTICATIONS.mp4
1.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/12. PWINSPECTOR.mp4
1.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/6. AZURE CROSS ACCOUNT COPIES.mp4
1.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/8. EXPOSED DATABASES WHY DOES THIS MATTER PHASE I.mp4
1.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/7. ADVANCED C2 ARCHITECTURES.mp4
1.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/7. DOMAIN FRONTING VISUALIZED.mp4
1.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/10. KUBERNETES CONTROL PLANE.mp4
1.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/12. Conclusion/2. SECTION 3 CONCLUSION.mp4
1.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/2. MAPPING AZURE URLS 1.mp4
1.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/6. TRAVIS EXAMPLE.mp4
1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/11. PIVOTING WITH HTTP.mp4
1.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/3. ACCESS CLOUD SERVICE PROVIDERS AMAZON.mp4
1.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/2. Course Roadmap 1.mp4
1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/5. RED TEAM AND EXPLOITATION.mp4
1.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/5. IAM AND USER VERSIONING 2.mp4
1.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/7. MAPPING INFRASTRUCTURES.mp4
1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/9. METASPLOIT AND VALID CRYPTOGRAPHY.mp4
1.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/5. HANDLING OUTPUT.mp4
1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/2. RED TEAM OPS IN THE CLOUD.mp4
1.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/16. AZURE AD PRIVILEGE ESCALATION.mp4
1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/3. CLOUD LANDING PAGE ABUSE.mp4
1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/2. WRAPPING UP SECTION 5.mp4
1.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/4. RDS DESIGN.mp4
1.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/2. INCREASING ATTACK SURFACES.mp4
1.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/3. AUTOSSH CONTAINER.mp4
1.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/6. INTRIGUE COLLECTIONS.mp4
1.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/6. EYEWITNESS OUTPUT.mp4
1.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/6. AZURE POLICIES RULES AND PERMISSIONS.mp4
1.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/3. SAML AND ADFS FLOW.mp4
1.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/10. SQLMAP.mp4
1.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/5. SSRF IMPLICATIONS.mp4
1.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/7. SMUGGLING WITH ENTERPRISE TOOLS.mp4
1.2 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/5. POSTMAN UI.mp4
1.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/8. ISSUES AND CONSIDERATIONS.mp4
1.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/17. RBAC ESCALATIONS.mp4
1.1 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/1. Course Roadmap 1.mp4
1.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/3. TABLE OF CONTENTS II.mp4
1.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/19. AUTOMATED ATTACK WITH PEIRATES.mp4
1.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/12. OAUTH V2 AUTHORIZATION CODE FLOW SERVERSIDE.mp4
1.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/3. TABLE OF CONTENTS II.mp4
1.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/4. Course Roadmap 2.mp4
1.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/11. LIGHT AND HEAVY SHELLS VISUALIZED.mp4
1.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/9. TIPS ON OUTPUT.mp4
1.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/8. WRAPPING UP SECTION 1.mp4
1.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/1. Exploitation and Red Team in the Cloud.mp4
1.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/13. KEEPING SECRETS IN KUBERNETES.mp4
1.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/3. SANS CLOUD SECURITY CURRICULUM.mp4
1.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/2. REDIRECTIONS OR OTHER PIVOTS.mp4
1.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/5. CONTAINER ARCHITECTURES VISUALIZED WINDOWS SERVER.mp4
988.2 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/20. PEIRATES OPTIONS.mp4
979.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/14. OPENID CONNECT FLOW AND OAUTH.mp4
977.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/2. NGROK.mp4
972.5 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/9. CREDENTIAL STUFFING ATTACK TOOLS.mp4
962.4 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/7. IAM PASSROLE.mp4
961.2 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/4. ATTACKER ACCOUNT IAM PERMISSIONS.mp4
941.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4
929.8 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/2. TOOLING FOR WEB APPLICATION PENETRATION TESTING.mp4
929.3 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/5. AZURE POLICIES.mp4
923.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/3. TABLE OF CONTENTS II.mp4
912.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/3. TABLE OF CONTENTS I.mp4
909.3 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/7. POSTMAN FEATURE HISTORY.mp4
903.6 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/4. TABLE OF CONTENTS I.mp4
902.6 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/7. Course Roadmap 2.mp4
868.4 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/11. POSTMAN FEATURE PARAMS HEADERS BODY.mp4
840.8 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/4. INTRIGUE.mp4
837.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/2. KUBERNETES.mp4
823.4 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/2. ASSET DISCOVERY AT SCALE.mp4
815.4 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/1. Course Roadmap 1.mp4
782.5 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/1. Course Roadmap 1 .mp4
782.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/9. Course Roadmap 2.mp4
772.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/6. POSTMAN FEATURE REQUEST WINDOW.mp4
767.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/5. EXFILTRATION BETWEEN BUCKETS.mp4
755.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/3. VISUALIZING THE SAME SITE.mp4
739.0 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/1. Course Roadmap 1 .mp4
728.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/1. Vulnerabilities in Cloud Native Applications.mp4
702.2 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/9. EXPOSED DATABASES WHY DOES THIS MATTER PHASE II.mp4
665.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/7. Course Roadmap 2.mp4
649.6 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/1. Course Roadmap 1.mp4
642.2 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/1. Course Roadmap.mp4
609.2 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/1. Course Roadmap.mp4
602.9 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event.mp4
590.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/8. SQL INJECTION VISUALIZED IN NODEJS 2.mp4
584.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/1. Course Roadmap 1.mp4
527.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/6. Course Roadmap 2.mp4
519.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/1. Course Roadmap.mp4
513.8 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/1. Course Roadmap 1.mp4
500.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/6. Course Roadmap 2.mp4
498.6 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/15. OPENID CONNECT FLOW AND OAUTH II.mp4
491.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/1. Course Roadmap 1 .mp4
490.4 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/1. Course Roadmap 1.mp4
487.6 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/1. Course Roadmap 1.mp4
482.6 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/1. Mapping Authentication and Cloud Services.mp4
481.3 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/1. Course Roadmap 1 .mp4
479.5 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/13. Course Roadmap 2.mp4
455.4 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4
448.5 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/1. Course Roadmap 1.mp4
434.3 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/13. Course Roadmap 2.mp4
429.6 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/14. Course Roadmap 2.mp4
412.3 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4
396.3 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/6. IAM AND USER VERSIONING 3.mp4
390.5 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/6. Course Roadmap.mp4
383.3 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/1. Course Roadmap.mp4
378.4 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4
368.6 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/15. Course Roadmap 2.mp4
363.2 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/6. Course Roadmap 2.mp4
360.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/1. Course Roadmap 1.mp4
336.4 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/1. Course Roadmap.mp4
332.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4
331.2 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/1. Course Roadmap 1.mp4
319.8 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/11. Course Roadmap 2.mp4
318.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/12. Conclusion/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4
313.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/1. Course Roadmap 1.mp4
308.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/1. Course Roadmap.mp4
293.4 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/1. Course Roadmap.mp4
289.8 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4
289.4 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/8. Course Roadmap 2.mp4
288.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/1. Course Roadmap 1.mp4
283.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/7. Course Roadmap 2.mp4
280.3 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/1. Course Roadmap 1.mp4
275.3 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/1. Course Roadmap 1.mp4
273.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/5. Web Application Injections hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4
260.6 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4
258.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/8. Course Roadmap 2.mp4
253.0 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/1. Course Roadmap.mp4
249.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/15. Course Roadmap 2.mp4
249.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/1. Course Roadmap.mp4
246.3 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/4. Course Roadmap.mp4
245.6 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/1. Course Roadmap 1.mp4
244.5 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/17. Course Roadmap 2.mp4
243.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4
236.3 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4
234.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/8. Course Roadmap 2.mp4
234.5 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/6. Course Roadmap 2.mp4
225.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/14. COURSE RESOURCES AND CONTACT INFORMATION.mp4
225.6 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/9. COURSE RESOURCES AND CONTACT INFORMATION.mp4
224.5 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/1. Course Roadmap 1.mp4
210.3 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/5. Course Roadmap 2.mp4
200.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/4. TABLE OF CONTENTS II.mp4
191.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/5. TABLE OF CONTENTS II.mp4
189.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/6. Course Roadmap 2.mp4
184.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/11. Course Roadmap 2.mp4
182.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/24. WRAPPING UP SECTION 4.mp4
112.5 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4
109.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/1. Course Roadmap.mp4
108.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/12. Course Roadmap 2.mp4
108.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/7. Course Roadmap 2.mp4
108.8 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/8. Course Roadmap 2.mp4
108.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/21. Course Roadmap 2.mp4
108.3 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/23. Course Roadmap 3.mp4
108.3 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/4. Course Roadmap.mp4
108.3 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/8. Course Roadmap 2.mp4
108.2 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4
108.2 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/12. Course Roadmap 2.mp4
108.2 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/1. Course Roadmap 1.mp4
108.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/1. Course Roadmap 1.mp4
107.8 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/9. Course Roadmap 2.mp4
107.5 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4
106.2 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/6. Course Roadmap 2.mp4
94.8 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/5. Course Roadmap 2.mp4
94.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/1. Course Roadmap 1 .mp4
94.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/12. Conclusion/1. Course Roadmap.mp4
94.0 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/1. Course Roadmap 1 .mp4
93.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/1. Course Roadmap 1 .mp4
93.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/4. Course Roadmap.mp4
93.5 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/14. Course Roadmap 2.mp4
92.9 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4
83.6 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/25. COURSE RESOURCES AND CONTACT INFORMATION.mp4
81.8 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/ReadMe!!.png
38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/ReadMe!!.png
38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/ReadMe!!.png
38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/ReadMe!!.png
38.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/ReadMe!!.png
38.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/ReadMe!!.png
38.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/ReadMe!!.png
38.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/ReadMe!!.png
38.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/ReadMe!!.png
38.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/ReadMe!!.png
38.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/ReadMe!!.png
38.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/ReadMe!!.png
38.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/ReadMe!!.png
38.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/ReadMe!!.png
38.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png
38.1 kB
SEC588 Video/ReadMe!!.png
38.1 kB
SEC588 PDF/ReadMe!!.png
38.1 kB
sec588.pdf
30.8 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/ReadMe.png
18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/ReadMe.png
18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/ReadMe.png
18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/ReadMe.png
18.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/ReadMe.png
18.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/ReadMe.png
18.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/ReadMe.png
18.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/ReadMe.png
18.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/ReadMe.png
18.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/ReadMe.png
18.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/ReadMe.png
18.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/ReadMe.png
18.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/ReadMe.png
18.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/ReadMe.png
18.1 kB
SEC588 Video/ReadMe.png
18.1 kB
SEC588 PDF/ReadMe.png
18.1 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/Hide01.png
15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/Hide01.png
15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/Hide01.png
15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/Hide01.png
15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/Hide01.png
15.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/Hide01.png
15.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/Hide01.png
15.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/Hide01.png
15.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/Hide01.png
15.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/Hide01.png
15.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/Hide01.png
15.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/Hide01.png
15.7 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/Hide01.png
15.7 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/Hide01.png
15.7 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/Hide01.png
15.7 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/Hide01.png
15.7 kB
SEC588 PDF/Hide01.png
15.7 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/ReadMe!.png
5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/ReadMe!.png
5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/ReadMe!.png
5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/ReadMe!.png
5.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/ReadMe!.png
5.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/ReadMe!.png
5.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/ReadMe!.png
5.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/ReadMe!.png
5.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/ReadMe!.png
5.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/ReadMe!.png
5.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/ReadMe!.png
5.0 kB
SEC588 Video/ReadMe!.png
5.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/ReadMe!.png
5.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/ReadMe!.png
5.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/ReadMe!.png
5.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/ReadMe!.png
5.0 kB
SEC588 PDF/ReadMe!.png
5.0 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/ReadMe.txt
2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/ReadMe.txt
2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/ReadMe.txt
2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/ReadMe.txt
2.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/ReadMe.txt
2.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/ReadMe.txt
2.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/ReadMe.txt
2.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/ReadMe.txt
2.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/ReadMe.txt
2.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/ReadMe.txt
2.9 kB
SEC588 Video/ReadMe.txt
2.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/ReadMe.txt
2.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/ReadMe.txt
2.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/ReadMe.txt
2.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/ReadMe.txt
2.9 kB
SEC588 PDF/ReadMe.txt
2.9 kB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/0. All Channell.txt
294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/0. All Channell.txt
294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/0. All Channell.txt
294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/0. All Channell.txt
294 Bytes
SEC588 Video/0. All Channell.txt
294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/0. All Channell.txt
294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/0. All Channell.txt
294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/0. All Channell.txt
294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/0. All Channell.txt
294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/0. All Channell.txt
294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/0. All Channell.txt
294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/0. All Channell.txt
294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/0. All Channell.txt
294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/0. All Channell.txt
294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/0. All Channell.txt
294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt
294 Bytes
SEC588 PDF/0. All Channell.txt
294 Bytes
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/Website.txt
55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/Website.txt
55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/Website.txt
55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/Website.txt
55 Bytes
SEC588 Video/Website.txt
55 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/Website.txt
55 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/Website.txt
55 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/Website.txt
55 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/Website.txt
55 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/Website.txt
55 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/Website.txt
55 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/Website.txt
55 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/Website.txt
55 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/Website.txt
55 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/Website.txt
55 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/Website.txt
55 Bytes
SEC588 PDF/Website.txt
55 Bytes
SEC588 PDF/Book Password.txt
22 Bytes
Icon
0 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!