Magnetic link has been copied to the cutting board

Name SEC588 - Cloud Penetration Testing

File Type package

Size 17.83GB

UpdateDate 2024-9-23

hash *****12802BD1F8949683DEE78329B8096F7A55

Hot 4

Files PDF 2020/SEC588 Book.pdf | 60.98MB PDF 2020/SEC588 Workbook.pdf | 27.34MB USB 2020/588.20.2.iso | 15.26GB USB 2020/SANS USB ISO MOUNT GUIDE.pdf | 1.51MB USB 2020/SEC588 - Lab Setup Instructions.pdf | 724.21KB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/1. Discovery Recon and Architecture at Scale.mp4 | 8.52MB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/2. SANS PENETRATION TESTING CURRICULUM.mp4 | 2.40MB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/3. SANS CLOUD SECURITY CURRICULUM.mp4 | 985.04KB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/4. TABLE OF CONTENTS I.mp4 | 881.41KB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/5. TABLE OF CONTENTS II.mp4 | 185.40KB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/6. Course Roadmap.mp4 | 374.29KB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/7. ABOUT THIS COURSE.mp4 | 3.67MB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/8. WHY CLOUD PENETRATION TESTING.mp4 | 4.40MB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/9. UNIQUE PROPERTIES OF CLOUD COMPUTING.mp4 | 4.70MB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/10. CLOUD COMPUTING PROPERTIES.mp4 | 4.17MB VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/11. TYPES OF CLOUDS.mp4 | 3.21MB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/1. Course Roadmap.mp4 | 286.51KB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/2. SANS TRADITIONAL PENETRATION TESTING METHODOLOGY.mp4 | 1.59MB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/3. SANS CLOUD PENETRATION TESTING METHODOLOGY.mp4 | 3.37MB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/4. PUBLIC CLOUD ASSESSMENTS.mp4 | 3.28MB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/5. DEMARCATION POINTS IN A PUBLIC CLOUD ENVIRONMENT.mp4 | 3.33MB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/6. ATTACKING SOFTWARE AS A SERVICE.mp4 | 1.71MB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/7. ATTACKING PLATFORM AS A SERVICE.mp4 | 3.55MB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/8. THE ATTACKERS VIEW OF IAAS.mp4 | 2.43MB VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/9. THE ATTACKERS VIEW OF PUBLIC IAAS VISUALIZED.mp4 | 2.76MB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/1. Course Roadmap.mp4 | 106.48KB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/2. INTERACTING WITH BASIC INFRASTRUCTURE CLOUD COMPONENTS.mp4 | 1.83MB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/3. UNDERSTANDING CONTAINERS RUNC.mp4 | 2.79MB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/4. UNDERSTANDING CONTAINERS CONTAINERD.mp4 | 2.44MB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/5. UNDERSTANDING CONTAINERS DOCKER.mp4 | 3.36MB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/6. UNDERSTANDING CONTAINERS DOCKER HUB.mp4 | 1.53MB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/7. SERVICE ORCHESTRATION KUBERNETES.mp4 | 3.03MB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/8. SERVERLESS INTRO.mp4 | 3.80MB VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/9. UNDERSTANDING FILESYSTEMS IN THE CLOUD.mp4 | 6.02MB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/1. Course Roadmap 1.mp4 | 276.36KB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/2. TESTING POLICIES PUBLIC CLOUD SERVICE PROVIDERS IAAS.mp4 | 1.84MB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/3. ACCESS CLOUD SERVICE PROVIDERS AMAZON.mp4 | 1.26MB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/4. AWS RESTRICTIONS.mp4 | 1.61MB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/5. AZURE POLICIES.mp4 | 902.03KB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/6. AZURE POLICIES RULES AND PERMISSIONS.mp4 | 1.14MB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/7. AZURE POLICIES RESTRICTIONS.mp4 | 1.99MB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/8. Course Roadmap 2.mp4 | 105.98KB VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/9. LAB 11 ACCESSING OUR CLOUD ASSETS.mp4 | 30.41MB VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/1. Course Roadmap.mp4 | 323.40KB VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/2. INCREASING ATTACK SURFACES.mp4 | 1.17MB VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/3. SURFACE AREA INCREASE TIPS AND TRICKS DOMAINS.mp4 | 4.15MB VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/4. TIPS AND TRICKS DOMAINS INTERNET DATA DOWNLOAD.mp4 | 6.07MB VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/5. CERTIFICATES REVIEW.mp4 | 4.20MB VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/6. ACME AND LETS ENCYPT.mp4 | 2.64MB VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/7. SURFACE AREA INCREASE TIPS AND TRICKS CERTIFICATE TRANSPARENCY.mp4 | 4.07MB VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/8. CERTIFICATE TRANSPARENCY FOR HOST DISCOVERY.mp4 | 2.36MB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/1. Course Roadmap 1.mp4 | 301.42KB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/2. DOMAIN ENUMERATION TOOLS.mp4 | 1.81MB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/3. GOBUSTER.mp4 | 2.66MB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/4. GOBUSTER SYNTAX.mp4 | 2.37MB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/5. GOBUSTER OUTPUT.mp4 | 2.64MB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/6. DNSRECONPY.mp4 | 2.84MB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/7. DNSRECONPY RUNNING DNSRECON.mp4 | 2.49MB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/8. DNSRECONPY OUTPUT AND LARGE LISTS.mp4 | 3.37MB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/9. Course Roadmap 2.mp4 | 104.98KB VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/10. LAB 12 CLOUD DISCOVERY LAB.mp4 | 55.98MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/1. Course Roadmap 1.mp4 | 282.60KB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/2. PORT SCANNING AT WEBSCALE.mp4 | 5.12MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/3. MASSCAN DEFAULT SYNTAX.mp4 | 1.90MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/4. MASSCAN SCAN OPTIONS 1.mp4 | 2.96MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/5. MASSCAN TESTING THEORETICAL LIMITS.mp4 | 2.72MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/6. MASSCAN TCP CONNECTIONS VS NMAP.mp4 | 2.27MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/7. MASSCAN WORKFLOW.mp4 | 3.48MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/8. MASSCAN FOLLOWED UP BY NMAP.mp4 | 1.54MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/9. NMAP TOUR.mp4 | 3.09MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/10. NMAP NSE.mp4 | 3.64MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/11. MASSCAN NMAP WORKFLOW.mp4 | 1.40MB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/12. Course Roadmap 2.mp4 | 105.63KB VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/13. LAB 13 PORTSCANS IN THE CLOUD.mp4 | 78.71MB VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/1. Course Roadmap 1.mp4 | 312.31KB VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/2. DEVELOPER WORKFLOW.mp4 | 3.39MB VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/3. GIT.mp4 | 2.63MB VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/4. FILES SECRETS FORMAT.mp4 | 5.58MB VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/5. SUBSET OF USEFUL STRINGS TO SEARCH FOR.mp4 | 2.68MB VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/6. ENV EXAMPLE.mp4 | 4.73MB VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/7. Course Roadmap 2.mp4 | 273.77KB VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/8. LAB 14 FINDING SECRETS IN GIT.mp4 | 69.52MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/1. Course Roadmap 1.mp4 | 103.68KB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/2. A WORD ON CLOUD ARCHITECTURES AND FEATURES.mp4 | 3.22MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/3. DISCOVERING EXPOSED SERVICES.mp4 | 4.68MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/4. DATABASES IN THE CLOUD.mp4 | 2.33MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/5. PAID EXTRAS REDISLABS.mp4 | 1.85MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/6. A WORD ON SQL INJECTION VS NOSQL INJECTION.mp4 | 1.76MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/7. CONNECTING TO CLOUD DATABASES.mp4 | 3.27MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/8. EXPOSED DATABASES WHY DOES THIS MATTER PHASE I.mp4 | 1.33MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/9. EXPOSED DATABASES WHY DOES THIS MATTER PHASE II.mp4 | 649.91KB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/10. IMPACT OF EXPOSING THESE INJECTIONS.mp4 | 1.97MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/11. SQL VS MONGODB A PRIMER.mp4 | 2.11MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/12. MONGODB COMMAND CHEAT SHEET.mp4 | 2.14MB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/13. Course Roadmap 2.mp4 | 419.49KB VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/14. LAB 15 DATABASES AND EXPOSED PORTS.mp4 | 50.24MB VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/1. Course Roadmap 1.mp4 | 1.07MB VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/2. VISUALIZATIONS DURING RECON.mp4 | 2.70MB VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/3. VISUALIZING THE SAME SITE.mp4 | 721.68KB VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/4. EYEWITNESS.mp4 | 1.79MB VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/5. EYEWITNESS COMMAND LINE SYNTAX.mp4 | 2.16MB VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/6. EYEWITNESS OUTPUT.mp4 | 1.16MB VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/7. Course Roadmap 2.mp4 | 106.23KB VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/8. LAB 16 EYEWITNESS IN THE CLOUD.mp4 | 30.30MB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/1. Course Roadmap.mp4 | 387.02KB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/2. ASSET DISCOVERY AT SCALE.mp4 | 796.27KB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/3. ASSET COLLECTION FRAMEWORKS.mp4 | 1.64MB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/4. INTRIGUE.mp4 | 817.40KB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/5. INTRIGUE DESIGN.mp4 | 1.89MB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/6. INTRIGUE COLLECTIONS.mp4 | 1.16MB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/7. INTRIGUE IDENT.mp4 | 2.62MB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/8. WRAPPING UP SECTION 1.mp4 | 1008.34KB VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/9. COURSE RESOURCES AND CONTACT INFORMATION.mp4 | 219.22KB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/1. Mapping Authentication and Cloud Services.mp4 | 470.04KB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/2. Course Roadmap 1.mp4 | 1.24MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/3. TABLE OF CONTENTS I.mp4 | 888.00KB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/4. TABLE OF CONTENTS II.mp4 | 186.63KB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/5. Course Roadmap 2.mp4 | 196.22KB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/6. PROCESS REVIEW.mp4 | 1.53MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/7. MAPPING INFRASTRUCTURES.mp4 | 1.23MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/8. MAPPING WORKFLOW.mp4 | 1.48MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/9. MAPPING THE TOTAL INFRASTRUCTURE.mp4 | 3.37MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/10. TIPS FOR INFRASTRUCTURE MAPPING 1.mp4 | 3.19MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/11. TIPS MAPPING IN AWS AND AZURE.mp4 | 6.20MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/12. TIPS FOR INFRASTRUCTURE MAPPING 2.mp4 | 2.71MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/13. MAPPING VISUALIZED MULTIPLE LAYERS OF ABSTRACTION.mp4 | 2.62MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/14. APPLICATION MAPPING VS INFRASTRUCTURE MAPPING.mp4 | 3.33MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/15. HTTP REQUEST REVIEW HTML.mp4 | 4.77MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/16. HTTP REQUEST REVIEW JSON.mp4 | 3.68MB VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/17. CLIENTSIDE MAPPINGS.mp4 | 1.68MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/1. Course Roadmap 1.mp4 | 230.73KB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/2. TOOLING FOR WEB APPLICATION PENETRATION TESTING.mp4 | 907.54KB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/3. POSTMAN.mp4 | 3.14MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/4. POSTMAN LIMITATIONS ON THE FREE BUILD.mp4 | 1.46MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/5. POSTMAN UI.mp4 | 1.09MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/6. POSTMAN FEATURE REQUEST WINDOW.mp4 | 749.87KB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/7. POSTMAN FEATURE HISTORY.mp4 | 882.47KB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/8. POSTMAN FEATURE COLLECTIONS.mp4 | 2.13MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/9. POSTMAN FEATURE METHOD OPTIONS.mp4 | 1.57MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/10. POSTMAN FEATURE ENVIRONMENTS.mp4 | 1.42MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/11. POSTMAN FEATURE PARAMS HEADERS BODY.mp4 | 821.08KB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/12. POSTMAN FEATURE AUTHORIZATION.mp4 | 3.20MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/13. POSTMAN FEATURE CODE.mp4 | 1.61MB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/14. Course Roadmap 2.mp4 | 90.75KB VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/15. LAB 21 HTTP AND POSTMAN TOUR.mp4 | 37.58MB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/1. Course Roadmap 1.mp4 | 476.14KB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/2. AWS SDK.mp4 | 3.69MB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/3. AWS CLI OPTIONS.mp4 | 3.95MB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/4. WORKING WITH AWS SERVICES.mp4 | 5.83MB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/5. HANDLING OUTPUT.mp4 | 1.21MB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/6. PARSING JSON OUTPUT IN CLI.mp4 | 1.67MB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/7. COMBINING JQ AND AWS.mp4 | 4.09MB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/8. Course Roadmap 2.mp4 | 281.25KB VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/9. LAB 22 AWS CLI TOUR.mp4 | 52.82MB VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/1. Course Roadmap.mp4 | 229.40KB VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/2. URL PRIMERS.mp4 | 1.67MB VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/3. ATTACKERS VIEW OF URIS AND RFC 3986.mp4 | 3.30MB VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/4. URIS URLS URNS.mp4 | 4.28MB VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/5. AMAZON ARN.mp4 | 8.47MB VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/1. Course Roadmap 1.mp4 | 205.34KB VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/2. MAPPING AND DISCOVERING SUBDOMAINS AND ROUTES.mp4 | 7.53MB VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/3. COMMONSPEAK2 QUERIES.mp4 | 1.46MB VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/4. COMMONSPEAK2 COMMANDS.mp4 | 3.65MB VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/5. COMMONSPEAK2 EXAMPLE OF SUBDOMAIN QUERY.mp4 | 3.95MB VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/6. Course Roadmap 2.mp4 | 351.54KB VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/7. LAB 23 MAPPING WITH COMMONSPEAK2.mp4 | 48.85MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/1. Course Roadmap 1.mp4 | 424.14KB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/2. AMAZON IAM.mp4 | 3.75MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/3. AMAZON AWS ROOT ACCOUNT.mp4 | 2.47MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/4. IDENTITY TYPES ON AWS.mp4 | 4.92MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/5. IAM POLICY EXAMPLE.mp4 | 4.81MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/6. AWS IAM VISUALIZED.mp4 | 3.17MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/7. IDENTITY VS RESOURCE POLICIES.mp4 | 1.77MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/8. POLICY BOUNDARIES.mp4 | 2.45MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/9. POLICIES FOR SERVICES.mp4 | 2.74MB VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/10. ATTRIBUTE BASED ACCESS CONTROL.mp4 | 1.87MB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/1. Course Roadmap 1.mp4 | 238.78KB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/2. CLASSIC PRIVILEGE ESCALATIONS.mp4 | 3.73MB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/3. IAM AND PRIVILEGE ESCALATION ISSUES.mp4 | 3.59MB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/4. IAM AND USER VERSIONING 1.mp4 | 1.56MB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/5. IAM AND USER VERSIONING 2.mp4 | 1.23MB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/6. IAM AND USER VERSIONING 3.mp4 | 381.36KB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/7. IAM PASSROLE.mp4 | 938.66KB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/8. AWS INSTANCE METADATA SERVICE.mp4 | 3.02MB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/9. AWS SESSION TOKENS.mp4 | 2.37MB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/10. AWS METADATA SESSION TOKENS V2.mp4 | 5.99MB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/11. Course Roadmap 2.mp4 | 311.44KB VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/12. LAB 24 AMAZON IAM PRIVILEGE ESCALATIONS PART 1.mp4 | 51.31MB VoD 2020/2. Mapping Authentication and Cloud Services/8. AWS KMS/1. Course Roadmap.mp4 | 252.05KB VoD 2020/2. Mapping Authentication and Cloud Services/8. AWS KMS/2. AMAZON KMS.mp4 | 2.75MB VoD 2020/2. Mapping Authentication and Cloud Services/8. AWS KMS/3. AMAZON KMS USE CASES.mp4 | 2.79MB VoD 2020/2. Mapping Authentication and Cloud Services/8. AWS KMS/4. KMS ENCRYPTDECRYPT BEHAVIOR.mp4 | 6.66MB VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/1. Course Roadmap 1.mp4 | 488.72KB VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/2. AWS LAMBDA FUNCTIONS.mp4 | 4.51MB VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/3. AWS LAMBDA CONSTRAINTS.mp4 | 2.50MB VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/4. AWS LAMBDA EXAMPLE.mp4 | 3.36MB VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/5. EXECUTING LAMBDA FUNCTIONS MANUALLY.mp4 | 2.42MB VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/6. Course Roadmap 2.mp4 | 92.55KB VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/7. LAB 25 AMAZON IAM PRIVILEGE ESCALATIONS PART 2.mp4 | 38.22MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/1. Course Roadmap 1.mp4 | 1.48MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/2. INTRODUCTION TO PACU.mp4 | 2.20MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/3. PACU INTERFACE.mp4 | 2.95MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/4. PACU MODULE DEPENDENCY AND PERMISSION DEPENDENCY.mp4 | 1.59MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/5. PACU RECON MODULES UNAUTHENTICATED.mp4 | 1.91MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/6. PACU ENUMERATION MODULES.mp4 | 2.73MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/7. PACU ESCALATE LATERAL MOVE.mp4 | 2.40MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/8. PACU EXPLOITS.mp4 | 1.65MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/9. PACU EVASIONS.mp4 | 3.62MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/10. PACU ADVANCED USAGE.mp4 | 3.02MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/11. Course Roadmap 2.mp4 | 178.23KB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/12. LAB 26 PACU LABS.mp4 | 30.85MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/13. WRAPPING UP SECTION 2.mp4 | 1.90MB VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/14. COURSE RESOURCES AND CONTACT INFORMATION.mp4 | 220.32KB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/1. Azure and Windows Services in the Cloud.mp4 | 6.97MB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/2. TABLE OF CONTENTS 1.mp4 | 5.45MB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/3. TABLE OF CONTENTS II.mp4 | 1.07MB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/4. Course Roadmap.mp4 | 91.31KB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/5. INTRODUCTION TO MICROSOFT CLOUD SERVICES.mp4 | 5.57MB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/6. COMPARISON OF SERVICE NAMES BETWEEN EACH PROVIDERS.mp4 | 5.00MB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/7. ON PREMISE AZURE AND AWS ROLE COMPARISONS.mp4 | 4.28MB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/8. AZURE CLI.mp4 | 2.19MB VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/9. AZURE LOGIN OPTIONS.mp4 | 3.34MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/1. Course Roadmap 1 .mp4 | 91.72KB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/2. MICROSOFT IDENTITY SERVICES.mp4 | 2.19MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/3. HIGHLEVEL VIEW OF IDENTITY IN MICROSOFT.mp4 | 5.24MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/4. MICROSOFT TRADITIONAL ACTIVE DIRECTORY.mp4 | 1.86MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/5. MICROSOFT ACTIVE DIRECTORY FEDERATED SERVICES.mp4 | 3.01MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/6. AZURE ACTIVE DIRECTORY.mp4 | 3.48MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/7. AZURE ACTIVE DIRECTORY ROLES.mp4 | 2.72MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/8. AZURE ACTIVE DIRECTORY DOMAIN SERVICES.mp4 | 3.81MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/9. ATTACKERS VIEW OF IDENTITY SERVICES IN AZURE.mp4 | 2.26MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/10. ATTACKERS VIEW OF AD CONNECTOR.mp4 | 2.14MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/11. AZURE AD RBAC ROLES.mp4 | 2.07MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/12. AZURE AD ADMINISTRATOR ROLES.mp4 | 1.55MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/13. AZURE AD SCOPE.mp4 | 2.04MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/14. AZURE AD ROLES VIEWED.mp4 | 1.53MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/15. AZURE RBAC VS AZURE AD ADMINS VS CROSS PLATFORM ADMINS.mp4 | 1.49MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/16. AZURE AD PRIVILEGE ESCALATION.mp4 | 1.20MB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/17. Course Roadmap 2.mp4 | 237.38KB VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/18. LAB 31 AZURE AD AND RBAC ROLES.mp4 | 29.47MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/1. Course Roadmap.mp4 | 243.67KB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/2. WHY FOCUS ON AUTHENTICATION STANDARDS.mp4 | 1.87MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/3. WEB AUTHENTICATION STANDARDS.mp4 | 1.83MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/4. WHY OAUTH.mp4 | 5.19MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/5. OAUTH AND BEARER AUTHENTICATION.mp4 | 2.79MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/6. OAUTH V1.mp4 | 2.20MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/7. OAUTH V1 TERMINOLOGY.mp4 | 3.53MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/8. ISSUES AND CONSIDERATIONS.mp4 | 1.09MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/9. OAUTH V2.mp4 | 2.22MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/10. FLOW TYPES.mp4 | 3.25MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/11. OAUTH V2 AUTHORIZATION CODE FLOW CLIENTSIDE.mp4 | 2.35MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/12. OAUTH V2 AUTHORIZATION CODE FLOW SERVERSIDE.mp4 | 1.06MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/13. OPENID CONNECT.mp4 | 3.27MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/14. OPENID CONNECT FLOW AND OAUTH.mp4 | 954.64KB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/15. OPENID CONNECT FLOW AND OAUTH II.mp4 | 479.56KB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/16. JAVASCRIPT WEB TOKENS.mp4 | 3.47MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/17. ATTACKERS VIEW OF JWTS.mp4 | 2.80MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/18. BEARER AUTHENTICATIONS.mp4 | 1.37MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/19. SAML.mp4 | 6.66MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/20. IDENTIFYING SAML.mp4 | 1.86MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/21. EXAMPLE SAML MESSAGE.mp4 | 1.78MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/22. ATTACKERS VIEW OF SAML.mp4 | 2.18MB VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/23. SAML WORKFLOWS.mp4 | 1.42MB VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/1. Course Roadmap 1 .mp4 | 91.65KB VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/2. GOLDEN SAML.mp4 | 3.85MB VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/3. SAML AND ADFS FLOW.mp4 | 1.12MB VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/4. SHIMIT.mp4 | 2.51MB VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/5. SHIMIT EXAMPLE.mp4 | 1.48MB VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/6. Course Roadmap 2.mp4 | 220.41KB VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/7. LAB 32 APIS AND POSTMAN.mp4 | 35.89MB VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/1. Course Roadmap.mp4 | 240.50KB VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/2. MAPPING AZURE URLS 1.mp4 | 1.28MB VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/3. MAPPING AZURE URLS 2.mp4 | 2.72MB VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/4. AZURE FILES.mp4 | 3.53MB VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/5. IDENTITIES WITH AZURE FILES AND ONPREMISE SERVICES.mp4 | 1.90MB VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/1. Course Roadmap 1 .mp4 | 468.22KB VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/2. AZURE VMS.mp4 | 4.34MB VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/3. VIRTUAL MACHINES COMMON COMMANDS.mp4 | 2.77MB VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/4. WORKING WITH DISKS IN AZURE.mp4 | 2.77MB VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/5. AZURE STORAGE EXPLORER AND DISM.mp4 | 1.65MB VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/6. Course Roadmap 2.mp4 | 179.65KB VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/7. LAB 33 AZURE VMS.mp4 | 102.50MB VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/1. Course Roadmap 1 .mp4 | 763.63KB VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/2. AZURE SERVERLESS.mp4 | 3.07MB VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/3. ATTACKERS VIEW OF WINDOWS FUNCTIONS.mp4 | 2.83MB VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/4. ATTACKING SERVERLESS FUNCTIONS.mp4 | 3.07MB VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/5. Course Roadmap 2.mp4 | 91.92KB VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/6. LAB 34 ATTACKING AZURE FUNCTIONS.mp4 | 22.49MB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/1. Course Roadmap 1 .mp4 | 711.43KB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/2. CODE EXECUTION ON WINDOWS.mp4 | 2.06MB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/3. CUSTOM SCRIPT EXTENSION.mp4 | 3.39MB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/4. EXECUTING COMMANDS THROUGH RUNCOMMAND.mp4 | 3.43MB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/5. HYBRID WORKERS.mp4 | 2.05MB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/6. HYBRID WORKERS WATCHERS.mp4 | 1.50MB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/7. WINRM.mp4 | 5.64MB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/8. Course Roadmap 2.mp4 | 228.99KB VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/9. LAB 35 RUNNING COMMANDS ON VMS.mp4 | 29.30MB VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/1. Course Roadmap.mp4 | 501.76KB VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/2. WINDOWS CONTAINERS.mp4 | 4.56MB VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/3. DOCKER AND WINDOWS.mp4 | 3.42MB VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/4. MAJOR DIFFERENCES BETWEEN LINUX AND WINDOWS CONTAINERS.mp4 | 3.80MB VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/5. ATTACKERS VIEW OF WINDOWS CONTAINERS.mp4 | 4.56MB VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/1. Course Roadmap 1 .mp4 | 91.87KB VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/2. MIMIKATZ.mp4 | 2.53MB VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/3. MIMIKATZ SHELL.mp4 | 2.44MB VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/4. MIMIKATZ MODULES.mp4 | 1.51MB VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/5. WINDOWS CONTAINERS AND MIMIKATZ.mp4 | 3.92MB VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/6. Course Roadmap 2.mp4 | 506.95KB VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/7. LAB 36 WINDOWS CONTAINERS LAB.mp4 | 31.57MB VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/1. Course Roadmap 1 .mp4 | 478.91KB VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/2. MICROSOFT GRAPH INTRODUCTION.mp4 | 4.49MB VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/3. MICROSOFT GRAPH CONSTRAINTS.mp4 | 3.33MB VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/4. MICROSOFT GRAPH PERMISSION EXAMPLE.mp4 | 1.69MB VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/5. POSTMAN AND MICROSOFT GRAPH.mp4 | 1.71MB VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/6. USING THE GRAPH API FOR SEARCH.mp4 | 4.15MB VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/7. Course Roadmap 2.mp4 | 848.06KB VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/8. LAB 37 POSTMAN AND MICROSOFT GRAPH API.mp4 | 66.96MB VoD 2020/3. Azure and Windows Services in the Cloud/12. Conclusion/1. Course Roadmap.mp4 | 91.79KB VoD 2020/3. Azure and Windows Services in the Cloud/12. Conclusion/2. SECTION 3 CONCLUSION.mp4 | 1.28MB VoD 2020/3. Azure and Windows Services in the Cloud/12. Conclusion/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4 | 305.75KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/1. Vulnerabilities in Cloud Native Applications.mp4 | 685.77KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/2. TABLE OF CONTENTS I.mp4 | 2.81MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/3. TABLE OF CONTENTS II.mp4 | 1.03MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/4. Course Roadmap.mp4 | 105.72KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/5. WHY FOCUS ON WEB APPLICATIONS.mp4 | 3.04MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/6. CLOUD NATIVE APPLICATIONS.mp4 | 3.22MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/1. Course Roadmap.mp4 | 105.63KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/2. CNCF TRAILMAP.mp4 | 4.54MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/3. CLOUD NATIVE APPLICATION ARCHITECTURES.mp4 | 2.54MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/4. HOW APPLICATIONS TALK CLASSIC.mp4 | 1.93MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/5. HOW CLOUD APPLICATIONS TALK CLOUD NATIVE.mp4 | 3.55MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/6. THE ARCHITECTURE FOR THIS SECTION.mp4 | 1.50MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/1. Course Roadmap.mp4 | 588.76KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/2. DEPLOYMENT PIPELINES.mp4 | 2.26MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/3. BUILD SYSTEMS.mp4 | 3.06MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/4. DETECTING CICD TOOLS.mp4 | 1.74MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/5. ATTACKING CICD TOOLS.mp4 | 2.71MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/6. TRAVIS EXAMPLE.mp4 | 1.27MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/7. TRAVIS CONFIGURATION FILES.mp4 | 2.45MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/8. USING TRAVIS TO MOVE LATERALLY.mp4 | 1.75MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/9. TIPS ON OUTPUT.mp4 | 1019.64KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/1. Course Roadmap 1.mp4 | 908.03KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/2. NGROK.mp4 | 949.72KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/3. NGROK OPTIONS.mp4 | 4.05MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/4. SEVERAL USE CASES.mp4 | 1.47MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/5. EXAMPLE SCRIPTS.mp4 | 3.80MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/6. Course Roadmap 2.mp4 | 486.90KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/7. LAB 41 ABUSING CICD PIPELINES.mp4 | 35.30MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/5. Web Application Injections/1. Course Roadmap.mp4 | 254.52KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/5. Web Application Injections/2. INJECTIONS.mp4 | 2.88MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/1. Course Roadmap 1.mp4 | 105.27KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/2. SSRFS.mp4 | 3.02MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/3. WHY ARE SSRFS POPULAR AGAIN.mp4 | 1.70MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/4. SSRF DISCOVERY.mp4 | 4.09MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/5. SSRF IMPLICATIONS.mp4 | 1.12MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/6. METADATAV2 TOKEN PROTECTIONS.mp4 | 2.28MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/7. SSRFS IN THE WILD.mp4 | 2.93MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/8. Course Roadmap 2.mp4 | 105.67KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/9. LAB 42 SSRFS.mp4 | 29.86MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/3. COMMAND LINE EXECUTION EXAMPLE.mp4 | 2.07MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/4. EXPLOITING COMMAND INJECTIONS.mp4 | 3.01MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/5. COMMAND INJECTION PRIMITIVES.mp4 | 2.06MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/6. COMMAND INJECTION AND CLOUD NATIVE.mp4 | 4.83MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/7. FINDING COMMAND INJECTIONS.mp4 | 3.49MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/8. Course Roadmap 2.mp4 | 247.03KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/9. LAB 43 COMMAND LINE INJECTIONS.mp4 | 77.87MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/1. Course Roadmap 1.mp4 | 359.93KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/2. SERVERLESS COMPUTING COMPUTE RUNTIMES.mp4 | 3.08MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/3. AWS LAMBDA.mp4 | 2.66MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/4. NODEJS LAMBDA EXAMPLE.mp4 | 2.68MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/5. EXPLOITS IN LAMBDA SOFTWARE.mp4 | 4.95MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/6. AWS LAMBDA SHELLS.mp4 | 1.81MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/7. Course Roadmap 2.mp4 | 634.36KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/8. LAB 44 SERVERLESS ATTACKS.mp4 | 51.17MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/1. Course Roadmap 1.mp4 | 328.49KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/2. DATABASES IN CLOUD ENVIRONMENTS.mp4 | 6.90MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/3. AMAZON RDS AND AURORA.mp4 | 2.26MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/4. RDS DESIGN.mp4 | 1.20MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/5. SQL INJECTION.mp4 | 2.29MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/6. SQL INJECTION WORKFLOW.mp4 | 2.26MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/7. SQL INJECTION VISUALIZED IN NODEJS 1.mp4 | 3.05MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/8. SQL INJECTION VISUALIZED IN NODEJS 2.mp4 | 571.04KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/9. SQL INJECTION VISUALIZED IN NODEJS 3.mp4 | 1.65MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/10. SQLMAP.mp4 | 1.12MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/11. SQLMAPPY.mp4 | 1.91MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/12. SQLMAP AND CLOUD APPLICATIONS.mp4 | 1.99MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/13. SQLMAP EXAMPLES.mp4 | 3.47MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/14. SQL INJECTION DEFENSES.mp4 | 2.56MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/15. Course Roadmap 2.mp4 | 243.26KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/16. LAB 45 SQL INJECTIONS.mp4 | 58.73MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/1. Course Roadmap.mp4 | 324.31KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/2. APPLICATION DEPLOYMENT STRATEGIES.mp4 | 3.66MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/3. CONTAINERS AND APPLICATION DEPLOYMENT.mp4 | 4.62MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/4. CONTAINER ARCHITECTURES VISUALIZED LINUX.mp4 | 2.62MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/5. CONTAINER ARCHITECTURES VISUALIZED WINDOWS SERVER.mp4 | 965.06KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/6. CONTAINERS SIMPLIFY APP DEPLOYMENTS.mp4 | 1.87MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/7. DOCKERFILE.mp4 | 3.81MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/8. CONTAINER CROSS COMMUNICATION.mp4 | 1.57MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/9. MICROSERVICES AND CLOUD NATIVE APPLICATIONS.mp4 | 2.54MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/1. Course Roadmap 1.mp4 | 267.04KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/2. KUBERNETES.mp4 | 804.13KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/3. KUBERNETES ARCHITECTURE I.mp4 | 1.59MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/4. KUBERNETES ARCHITECTURE II.mp4 | 2.10MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/5. KUBERNETES NODES.mp4 | 2.16MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/6. KUBERNETES ARCHITECTURE III.mp4 | 1.62MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/7. CERTIFICATE USAGE IN KUBERNETES.mp4 | 2.11MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/8. ATTACKERS VIEW OF THE KUBERNETES.mp4 | 1.81MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/9. KUBERNETES TYPES OF DEPLOYMENTS.mp4 | 2.17MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/10. KUBERNETES CONTROL PLANE.mp4 | 1.29MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/11. PODS.mp4 | 2.11MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/12. PRIVILEGED PODS.mp4 | 1.52MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/13. KEEPING SECRETS IN KUBERNETES.mp4 | 995.35KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/14. TELSA EXAMPLE.mp4 | 1.65MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/15. RBAC.mp4 | 2.21MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/16. RBAC EXAMPLE.mp4 | 4.90MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/17. RBAC ESCALATIONS.mp4 | 1.09MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/18. VULNERABILITY HUNTING IN KUBERNETES.mp4 | 2.04MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/19. AUTOMATED ATTACK WITH PEIRATES.mp4 | 1.06MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/20. PEIRATES OPTIONS.mp4 | 956.12KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/21. Course Roadmap 2.mp4 | 105.81KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/22. LAB 46 PEIRATES LAB.mp4 | 101.41MB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/23. Course Roadmap 3.mp4 | 105.76KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/24. WRAPPING UP SECTION 4.mp4 | 109.90KB VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/25. COURSE RESOURCES AND CONTACT INFORMATION.mp4 | 79.86KB VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/1. Exploitation and Red Team in the Cloud.mp4 | 1005.57KB VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/2. TABLE OF CONTENTS I.mp4 | 2.33MB VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/3. TABLE OF CONTENTS II.mp4 | 891.27KB VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/4. Course Roadmap.mp4 | 239.83KB VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/5. RED TEAM AND EXPLOITATION.mp4 | 1.24MB VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/6. WHY DISCUSS RED TEAM.mp4 | 1.46MB VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/7. RED TEAM AND THE CLOUD.mp4 | 1.92MB VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/8. DIFFICULTY IN BLOCKING CLOUD SERVICE PROVIDERS.mp4 | 4.21MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/1. Course Roadmap 1.mp4 | 627.15KB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/2. CHALLENGES WITH TRADITIONAL PAYLOADS.mp4 | 3.50MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/3. GETTING PAYLOADS ONTO SYSTEMS.mp4 | 2.15MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/4. PAYLOAD RENAISSANCE.mp4 | 3.03MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/5. TRADITIONAL PAYLOADS FOR PENETRATION TESTING FRAMEWORKs.mp4 | 1.90MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/6. BEACONBASED PAYLOADS.mp4 | 1.76MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/7. ADVANCED C2 ARCHITECTURES.mp4 | 1.32MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/8. WEB SHELLS.mp4 | 2.89MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/9. HEAVY SHELL EXAMPLES.mp4 | 1.53MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/10. LIGHTWEIGHT SHELLS.mp4 | 2.35MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/11. LIGHT AND HEAVY SHELLS VISUALIZED.mp4 | 1021.07KB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/12. DESIGN CHOICES AND CONSIDERATION FOR PAYLOADS.mp4 | 2.44MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/13. CHOICES FOR RESTRICTIONS.mp4 | 2.08MB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/14. Course Roadmap 2.mp4 | 402.59KB VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/15. LAB 51 LIGHTWEIGHT AND HEAVYWEIGHT WEBSHELLS.mp4 | 31.28MB VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/1. Course Roadmap.mp4 | 594.95KB VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/2. RED TEAM OPS IN THE CLOUD.mp4 | 1.20MB VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/3. LEVERAGE CSP NETWORKING OPTIONS.mp4 | 4.47MB VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/4. PROXYCANNONNG.mp4 | 1.58MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/1. Course Roadmap 1.mp4 | 268.80KB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/2. BACKDOORING CONTAINERS.mp4 | 3.17MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/3. AUTOSSH CONTAINER.mp4 | 1.17MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/4. METASPLOIT.mp4 | 1.61MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/5. NAVIGATING THE METASPLOIT FRAMEWORK.mp4 | 2.12MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/6. INTRODUCTION TO METERPRETER.mp4 | 2.28MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/7. EXPLOIT MULTI HANDLER.mp4 | 2.23MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/8. STAGED AND STAGELESS PAYLOADS.mp4 | 2.50MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/9. SETTING UP BOTH STAGELESS AND STAGED METERPRETER.mp4 | 2.24MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/10. BUILDING PAYLOADS.mp4 | 2.00MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/11. KUBERNETES AND METERPRETER.mp4 | 1.42MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/12. BACKDOOR CONTAINER WORKFLOW.mp4 | 2.03MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/13. KUBERNETES AND THE PAYLOAD.mp4 | 1.54MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/14. EXAMPLE DEPLOYMENT YAML.mp4 | 1.81MB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/15. Course Roadmap 2.mp4 | 354.71KB VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/16. LAB 52 BACKDOORING CONTAINERS.mp4 | 41.30MB VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/1. Course Roadmap.mp4 | 283.02KB VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/2. DATA PIVOTING OPTIONS.mp4 | 1.64MB VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/3. AWS CROSSACCOUNT COPIES.mp4 | 1.94MB VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/4. ATTACKER ACCOUNT IAM PERMISSIONS.mp4 | 919.81KB VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/5. EXFILTRATION BETWEEN BUCKETS.mp4 | 737.33KB VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/6. AZURE CROSS ACCOUNT COPIES.mp4 | 1.34MB VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/7. SMUGGLING WITH ENTERPRISE TOOLS.mp4 | 1.11MB VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/8. MICROSOFT ONEDRIVE.mp4 | 1.54MB VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/1. Course Roadmap 1.mp4 | 471.31KB VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/2. USERNAME HARVESTING IN THE CLOUD.mp4 | 2.17MB VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/3. CLOUD LANDING PAGE ABUSE.mp4 | 1.20MB VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/4. Course Roadmap 2.mp4 | 1.01MB VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/5. LAB 53 USERNAME AND PIVOT SETUP.mp4 | 28.24MB VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/1. Course Roadmap.mp4 | 369.51KB VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/2. PASSWORDS.mp4 | 1.38MB VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/3. MULTIPLE ATTACK METHODS FOR PASSWORDS.mp4 | 1.45MB VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/4. PASSWORD LISTS AND WORDLISTS.mp4 | 2.15MB VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/5. CEWL AND CUSTOM WORDLISTS.mp4 | 2.64MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/1. Course Roadmap 1.mp4 | 105.58KB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/2. PASSWORD ATTACK TYPES AND METHODOLOGY.mp4 | 1.77MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/3. MOUNTING A BRUTE FORCE ATTACK.mp4 | 1.53MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/4. MOUNTING A DICTIONARY ATTACK.mp4 | 1.71MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/5. MOUNTING A PASSWORD SPRAYING ATTACK.mp4 | 2.26MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/6. MOUNTING A CREDENTIAL STUFFING ATTACK.mp4 | 1.56MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/7. ACCOUNT ATTACK METHODOLOGY.mp4 | 1.42MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/8. USERNAME STRUCTURES.mp4 | 1.71MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/9. CREDENTIAL STUFFING ATTACK TOOLS.mp4 | 939.82KB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/10. THCHYDRA.mp4 | 2.12MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/11. THCHYDRA SYNTAX AND EXAMPLES.mp4 | 2.02MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/12. PWINSPECTOR.mp4 | 1.37MB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/13. Course Roadmap 2.mp4 | 444.73KB VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/14. LAB 54 CREDENTIAL STUFFING AND PASSWORD.mp4 | 25.65MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/1. Course Roadmap 1.mp4 | 514.74KB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/2. OBFUSCATION OF C2 INFRASTRUCTURE.mp4 | 1.99MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/3. FINDING VALID DOMAINS WITH DOMAIN HUNTER.mp4 | 5.44MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/4. DOMAIN HUNTER SYNTAX.mp4 | 2.57MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/5. BUYING GOOD WEB PROPERTIES FLIPPA.mp4 | 2.05MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/6. DOMAIN FRONTING.mp4 | 3.06MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/7. DOMAIN FRONTING VISUALIZED.mp4 | 1.30MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/8. DOMAIN FRONTING METHODOLOGY.mp4 | 3.78MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/9. METASPLOIT AND VALID CRYPTOGRAPHY.mp4 | 1.23MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/10. USING VALID CERTIFICATES IN METASPLOIT.mp4 | 2.77MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/11. PIVOTING WITH HTTP.mp4 | 1.26MB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/12. Course Roadmap 2.mp4 | 106.31KB VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/13. LAB 55 C2 REDIRECTIONS.mp4 | 30.76MB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/1. Course Roadmap 1.mp4 | 764.13KB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/2. REDIRECTIONS OR OTHER PIVOTS.mp4 | 976.80KB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/3. INTRODUCTION TO SOCAT.mp4 | 1.49MB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/4. SOCAT ADDRESS FORMAT.mp4 | 2.84MB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/5. SOCAT EXAMPLES.mp4 | 2.79MB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/6. USING PORT PROXIES WITH BUILT IN TOOLS.mp4 | 1.65MB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/7. IPTABLES AS A REDIRECTION TOOL.mp4 | 2.62MB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/8. WINDOWS PORTPROXY.mp4 | 1.82MB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/9. Course Roadmap 2.mp4 | 754.04KB VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/10. LAB 56 SOCKET AND OS REDIRECTIONS .mp4 | 33.96MB VoD 2020/5. Exploitation and Red Team in the Cloud/11. Class Conclusions/1. Course Roadmap.mp4 | 106.36KB VoD 2020/5. Exploitation and Red Team in the Cloud/11. Class Conclusions/2. WRAPPING UP SECTION 5.mp4 | 1.20MB VoD 2020/5. Exploitation and Red Team in the Cloud/11. Class Conclusions/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4 | 437.99KB VoD 2020/6. Capstone Event/1. Capstone Event/1. Capstone Event.mp4 | 577.04KB VoD 2020/6. Capstone Event/1. Capstone Event/2. CAPSTONE EVENT RULES.mp4 | 76.16MB VoD 2020/6. Capstone Event/1. Capstone Event/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4 | 81.60KB

Recommend

Magnetic link has been copied to the cutting board