TorBT - Torrents and Magnet Links Search Engine

SEC588 - Cloud Penetration Testing

File Name
Size
PDF 2020/SEC588 Book.pdf
61 MB
PDF 2020/SEC588 Workbook.pdf
27 MB
USB 2020/588.20.2.iso
15 GB
USB 2020/SANS USB ISO MOUNT GUIDE.pdf
1.5 MB
USB 2020/SEC588 - Lab Setup Instructions.pdf
724 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/1. Discovery Recon and Architecture at Scale.mp4
8.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/2. SANS PENETRATION TESTING CURRICULUM.mp4
2.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/3. SANS CLOUD SECURITY CURRICULUM.mp4
985 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/4. TABLE OF CONTENTS I.mp4
881 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/5. TABLE OF CONTENTS II.mp4
185 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/6. Course Roadmap.mp4
374 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/7. ABOUT THIS COURSE.mp4
3.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/8. WHY CLOUD PENETRATION TESTING.mp4
4.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/9. UNIQUE PROPERTIES OF CLOUD COMPUTING.mp4
4.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/10. CLOUD COMPUTING PROPERTIES.mp4
4.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/11. TYPES OF CLOUDS.mp4
3.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/1. Course Roadmap.mp4
286 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/2. SANS TRADITIONAL PENETRATION TESTING METHODOLOGY.mp4
1.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/3. SANS CLOUD PENETRATION TESTING METHODOLOGY.mp4
3.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/4. PUBLIC CLOUD ASSESSMENTS.mp4
3.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/5. DEMARCATION POINTS IN A PUBLIC CLOUD ENVIRONMENT.mp4
3.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/6. ATTACKING SOFTWARE AS A SERVICE.mp4
1.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/7. ATTACKING PLATFORM AS A SERVICE.mp4
3.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/8. THE ATTACKERS VIEW OF IAAS.mp4
2.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/9. THE ATTACKERS VIEW OF PUBLIC IAAS VISUALIZED.mp4
2.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/1. Course Roadmap.mp4
106 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/2. INTERACTING WITH BASIC INFRASTRUCTURE CLOUD COMPONENTS.mp4
1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/3. UNDERSTANDING CONTAINERS RUNC.mp4
2.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/4. UNDERSTANDING CONTAINERS CONTAINERD.mp4
2.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/5. UNDERSTANDING CONTAINERS DOCKER.mp4
3.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/6. UNDERSTANDING CONTAINERS DOCKER HUB.mp4
1.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/7. SERVICE ORCHESTRATION KUBERNETES.mp4
3.0 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/8. SERVERLESS INTRO.mp4
3.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/9. UNDERSTANDING FILESYSTEMS IN THE CLOUD.mp4
6.0 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/1. Course Roadmap 1.mp4
276 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/2. TESTING POLICIES PUBLIC CLOUD SERVICE PROVIDERS IAAS.mp4
1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/3. ACCESS CLOUD SERVICE PROVIDERS AMAZON.mp4
1.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/4. AWS RESTRICTIONS.mp4
1.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/5. AZURE POLICIES.mp4
902 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/6. AZURE POLICIES RULES AND PERMISSIONS.mp4
1.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/7. AZURE POLICIES RESTRICTIONS.mp4
2.0 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/8. Course Roadmap 2.mp4
106 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/9. LAB 11 ACCESSING OUR CLOUD ASSETS.mp4
30 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/1. Course Roadmap.mp4
323 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/2. INCREASING ATTACK SURFACES.mp4
1.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/3. SURFACE AREA INCREASE TIPS AND TRICKS DOMAINS.mp4
4.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/4. TIPS AND TRICKS DOMAINS INTERNET DATA DOWNLOAD.mp4
6.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/5. CERTIFICATES REVIEW.mp4
4.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/6. ACME AND LETS ENCYPT.mp4
2.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/7. SURFACE AREA INCREASE TIPS AND TRICKS CERTIFICATE TRANSPARENCY.mp4
4.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/8. CERTIFICATE TRANSPARENCY FOR HOST DISCOVERY.mp4
2.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/1. Course Roadmap 1.mp4
301 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/2. DOMAIN ENUMERATION TOOLS.mp4
1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/3. GOBUSTER.mp4
2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/4. GOBUSTER SYNTAX.mp4
2.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/5. GOBUSTER OUTPUT.mp4
2.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/6. DNSRECONPY.mp4
2.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/7. DNSRECONPY RUNNING DNSRECON.mp4
2.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/8. DNSRECONPY OUTPUT AND LARGE LISTS.mp4
3.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/9. Course Roadmap 2.mp4
105 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/10. LAB 12 CLOUD DISCOVERY LAB.mp4
56 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/1. Course Roadmap 1.mp4
283 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/2. PORT SCANNING AT WEBSCALE.mp4
5.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/3. MASSCAN DEFAULT SYNTAX.mp4
1.9 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/4. MASSCAN SCAN OPTIONS 1.mp4
3.0 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/5. MASSCAN TESTING THEORETICAL LIMITS.mp4
2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/6. MASSCAN TCP CONNECTIONS VS NMAP.mp4
2.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/7. MASSCAN WORKFLOW.mp4
3.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/8. MASSCAN FOLLOWED UP BY NMAP.mp4
1.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/9. NMAP TOUR.mp4
3.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/10. NMAP NSE.mp4
3.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/11. MASSCAN NMAP WORKFLOW.mp4
1.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/12. Course Roadmap 2.mp4
106 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/13. LAB 13 PORTSCANS IN THE CLOUD.mp4
79 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/1. Course Roadmap 1.mp4
312 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/2. DEVELOPER WORKFLOW.mp4
3.4 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/3. GIT.mp4
2.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/4. FILES SECRETS FORMAT.mp4
5.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/5. SUBSET OF USEFUL STRINGS TO SEARCH FOR.mp4
2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/6. ENV EXAMPLE.mp4
4.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/7. Course Roadmap 2.mp4
274 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/8. LAB 14 FINDING SECRETS IN GIT.mp4
70 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/1. Course Roadmap 1.mp4
104 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/2. A WORD ON CLOUD ARCHITECTURES AND FEATURES.mp4
3.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/3. DISCOVERING EXPOSED SERVICES.mp4
4.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/4. DATABASES IN THE CLOUD.mp4
2.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/5. PAID EXTRAS REDISLABS.mp4
1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/6. A WORD ON SQL INJECTION VS NOSQL INJECTION.mp4
1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/7. CONNECTING TO CLOUD DATABASES.mp4
3.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/8. EXPOSED DATABASES WHY DOES THIS MATTER PHASE I.mp4
1.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/9. EXPOSED DATABASES WHY DOES THIS MATTER PHASE II.mp4
650 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/10. IMPACT OF EXPOSING THESE INJECTIONS.mp4
2.0 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/11. SQL VS MONGODB A PRIMER.mp4
2.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/12. MONGODB COMMAND CHEAT SHEET.mp4
2.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/13. Course Roadmap 2.mp4
420 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/14. LAB 15 DATABASES AND EXPOSED PORTS.mp4
50 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/1. Course Roadmap 1.mp4
1.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/2. VISUALIZATIONS DURING RECON.mp4
2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/3. VISUALIZING THE SAME SITE.mp4
722 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/4. EYEWITNESS.mp4
1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/5. EYEWITNESS COMMAND LINE SYNTAX.mp4
2.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/6. EYEWITNESS OUTPUT.mp4
1.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/7. Course Roadmap 2.mp4
106 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/8. LAB 16 EYEWITNESS IN THE CLOUD.mp4
30 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/1. Course Roadmap.mp4
387 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/2. ASSET DISCOVERY AT SCALE.mp4
796 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/3. ASSET COLLECTION FRAMEWORKS.mp4
1.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/4. INTRIGUE.mp4
817 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/5. INTRIGUE DESIGN.mp4
1.9 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/6. INTRIGUE COLLECTIONS.mp4
1.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/7. INTRIGUE IDENT.mp4
2.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/8. WRAPPING UP SECTION 1.mp4
1008 kB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/9. COURSE RESOURCES AND CONTACT INFORMATION.mp4
219 kB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/1. Mapping Authentication and Cloud Services.mp4
470 kB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/2. Course Roadmap 1.mp4
1.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/3. TABLE OF CONTENTS I.mp4
888 kB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/4. TABLE OF CONTENTS II.mp4
187 kB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/5. Course Roadmap 2.mp4
196 kB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/6. PROCESS REVIEW.mp4
1.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/7. MAPPING INFRASTRUCTURES.mp4
1.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/8. MAPPING WORKFLOW.mp4
1.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/9. MAPPING THE TOTAL INFRASTRUCTURE.mp4
3.4 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/10. TIPS FOR INFRASTRUCTURE MAPPING 1.mp4
3.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/11. TIPS MAPPING IN AWS AND AZURE.mp4
6.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/12. TIPS FOR INFRASTRUCTURE MAPPING 2.mp4
2.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/13. MAPPING VISUALIZED MULTIPLE LAYERS OF ABSTRACTION.mp4
2.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/14. APPLICATION MAPPING VS INFRASTRUCTURE MAPPING.mp4
3.3 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/15. HTTP REQUEST REVIEW HTML.mp4
4.8 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/16. HTTP REQUEST REVIEW JSON.mp4
3.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/17. CLIENTSIDE MAPPINGS.mp4
1.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/1. Course Roadmap 1.mp4
231 kB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/2. TOOLING FOR WEB APPLICATION PENETRATION TESTING.mp4
908 kB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/3. POSTMAN.mp4
3.1 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/4. POSTMAN LIMITATIONS ON THE FREE BUILD.mp4
1.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/5. POSTMAN UI.mp4
1.1 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/6. POSTMAN FEATURE REQUEST WINDOW.mp4
750 kB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/7. POSTMAN FEATURE HISTORY.mp4
882 kB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/8. POSTMAN FEATURE COLLECTIONS.mp4
2.1 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/9. POSTMAN FEATURE METHOD OPTIONS.mp4
1.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/10. POSTMAN FEATURE ENVIRONMENTS.mp4
1.4 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/11. POSTMAN FEATURE PARAMS HEADERS BODY.mp4
821 kB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/12. POSTMAN FEATURE AUTHORIZATION.mp4
3.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/13. POSTMAN FEATURE CODE.mp4
1.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/14. Course Roadmap 2.mp4
91 kB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/15. LAB 21 HTTP AND POSTMAN TOUR.mp4
38 MB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/1. Course Roadmap 1.mp4
476 kB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/2. AWS SDK.mp4
3.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/3. AWS CLI OPTIONS.mp4
4.0 MB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/4. WORKING WITH AWS SERVICES.mp4
5.8 MB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/5. HANDLING OUTPUT.mp4
1.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/6. PARSING JSON OUTPUT IN CLI.mp4
1.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/7. COMBINING JQ AND AWS.mp4
4.1 MB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/8. Course Roadmap 2.mp4
281 kB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/9. LAB 22 AWS CLI TOUR.mp4
53 MB
VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/1. Course Roadmap.mp4
229 kB
VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/2. URL PRIMERS.mp4
1.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/3. ATTACKERS VIEW OF URIS AND RFC 3986.mp4
3.3 MB
VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/4. URIS URLS URNS.mp4
4.3 MB
VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/5. AMAZON ARN.mp4
8.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/1. Course Roadmap 1.mp4
205 kB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/2. MAPPING AND DISCOVERING SUBDOMAINS AND ROUTES.mp4
7.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/3. COMMONSPEAK2 QUERIES.mp4
1.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/4. COMMONSPEAK2 COMMANDS.mp4
3.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/5. COMMONSPEAK2 EXAMPLE OF SUBDOMAIN QUERY.mp4
3.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/6. Course Roadmap 2.mp4
352 kB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/7. LAB 23 MAPPING WITH COMMONSPEAK2.mp4
49 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/1. Course Roadmap 1.mp4
424 kB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/2. AMAZON IAM.mp4
3.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/3. AMAZON AWS ROOT ACCOUNT.mp4
2.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/4. IDENTITY TYPES ON AWS.mp4
4.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/5. IAM POLICY EXAMPLE.mp4
4.8 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/6. AWS IAM VISUALIZED.mp4
3.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/7. IDENTITY VS RESOURCE POLICIES.mp4
1.8 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/8. POLICY BOUNDARIES.mp4
2.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/9. POLICIES FOR SERVICES.mp4
2.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/10. ATTRIBUTE BASED ACCESS CONTROL.mp4
1.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/1. Course Roadmap 1.mp4
239 kB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/2. CLASSIC PRIVILEGE ESCALATIONS.mp4
3.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/3. IAM AND PRIVILEGE ESCALATION ISSUES.mp4
3.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/4. IAM AND USER VERSIONING 1.mp4
1.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/5. IAM AND USER VERSIONING 2.mp4
1.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/6. IAM AND USER VERSIONING 3.mp4
381 kB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/7. IAM PASSROLE.mp4
939 kB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/8. AWS INSTANCE METADATA SERVICE.mp4
3.0 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/9. AWS SESSION TOKENS.mp4
2.4 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/10. AWS METADATA SESSION TOKENS V2.mp4
6.0 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/11. Course Roadmap 2.mp4
311 kB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/12. LAB 24 AMAZON IAM PRIVILEGE ESCALATIONS PART 1.mp4
51 MB
VoD 2020/2. Mapping Authentication and Cloud Services/8. AWS KMS/1. Course Roadmap.mp4
252 kB
VoD 2020/2. Mapping Authentication and Cloud Services/8. AWS KMS/2. AMAZON KMS.mp4
2.8 MB
VoD 2020/2. Mapping Authentication and Cloud Services/8. AWS KMS/3. AMAZON KMS USE CASES.mp4
2.8 MB
VoD 2020/2. Mapping Authentication and Cloud Services/8. AWS KMS/4. KMS ENCRYPTDECRYPT BEHAVIOR.mp4
6.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/1. Course Roadmap 1.mp4
489 kB
VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/2. AWS LAMBDA FUNCTIONS.mp4
4.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/3. AWS LAMBDA CONSTRAINTS.mp4
2.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/4. AWS LAMBDA EXAMPLE.mp4
3.4 MB
VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/5. EXECUTING LAMBDA FUNCTIONS MANUALLY.mp4
2.4 MB
VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/6. Course Roadmap 2.mp4
93 kB
VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/7. LAB 25 AMAZON IAM PRIVILEGE ESCALATIONS PART 2.mp4
38 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/1. Course Roadmap 1.mp4
1.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/2. INTRODUCTION TO PACU.mp4
2.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/3. PACU INTERFACE.mp4
2.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/4. PACU MODULE DEPENDENCY AND PERMISSION DEPENDENCY.mp4
1.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/5. PACU RECON MODULES UNAUTHENTICATED.mp4
1.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/6. PACU ENUMERATION MODULES.mp4
2.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/7. PACU ESCALATE LATERAL MOVE.mp4
2.4 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/8. PACU EXPLOITS.mp4
1.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/9. PACU EVASIONS.mp4
3.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/10. PACU ADVANCED USAGE.mp4
3.0 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/11. Course Roadmap 2.mp4
178 kB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/12. LAB 26 PACU LABS.mp4
31 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/13. WRAPPING UP SECTION 2.mp4
1.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/14. COURSE RESOURCES AND CONTACT INFORMATION.mp4
220 kB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/1. Azure and Windows Services in the Cloud.mp4
7.0 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/2. TABLE OF CONTENTS 1.mp4
5.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/3. TABLE OF CONTENTS II.mp4
1.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/4. Course Roadmap.mp4
91 kB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/5. INTRODUCTION TO MICROSOFT CLOUD SERVICES.mp4
5.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/6. COMPARISON OF SERVICE NAMES BETWEEN EACH PROVIDERS.mp4
5.0 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/7. ON PREMISE AZURE AND AWS ROLE COMPARISONS.mp4
4.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/8. AZURE CLI.mp4
2.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/9. AZURE LOGIN OPTIONS.mp4
3.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/1. Course Roadmap 1 .mp4
92 kB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/2. MICROSOFT IDENTITY SERVICES.mp4
2.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/3. HIGHLEVEL VIEW OF IDENTITY IN MICROSOFT.mp4
5.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/4. MICROSOFT TRADITIONAL ACTIVE DIRECTORY.mp4
1.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/5. MICROSOFT ACTIVE DIRECTORY FEDERATED SERVICES.mp4
3.0 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/6. AZURE ACTIVE DIRECTORY.mp4
3.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/7. AZURE ACTIVE DIRECTORY ROLES.mp4
2.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/8. AZURE ACTIVE DIRECTORY DOMAIN SERVICES.mp4
3.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/9. ATTACKERS VIEW OF IDENTITY SERVICES IN AZURE.mp4
2.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/10. ATTACKERS VIEW OF AD CONNECTOR.mp4
2.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/11. AZURE AD RBAC ROLES.mp4
2.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/12. AZURE AD ADMINISTRATOR ROLES.mp4
1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/13. AZURE AD SCOPE.mp4
2.0 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/14. AZURE AD ROLES VIEWED.mp4
1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/15. AZURE RBAC VS AZURE AD ADMINS VS CROSS PLATFORM ADMINS.mp4
1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/16. AZURE AD PRIVILEGE ESCALATION.mp4
1.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/17. Course Roadmap 2.mp4
237 kB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/18. LAB 31 AZURE AD AND RBAC ROLES.mp4
30 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/1. Course Roadmap.mp4
244 kB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/2. WHY FOCUS ON AUTHENTICATION STANDARDS.mp4
1.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/3. WEB AUTHENTICATION STANDARDS.mp4
1.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/4. WHY OAUTH.mp4
5.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/5. OAUTH AND BEARER AUTHENTICATION.mp4
2.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/6. OAUTH V1.mp4
2.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/7. OAUTH V1 TERMINOLOGY.mp4
3.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/8. ISSUES AND CONSIDERATIONS.mp4
1.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/9. OAUTH V2.mp4
2.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/10. FLOW TYPES.mp4
3.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/11. OAUTH V2 AUTHORIZATION CODE FLOW CLIENTSIDE.mp4
2.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/12. OAUTH V2 AUTHORIZATION CODE FLOW SERVERSIDE.mp4
1.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/13. OPENID CONNECT.mp4
3.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/14. OPENID CONNECT FLOW AND OAUTH.mp4
955 kB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/15. OPENID CONNECT FLOW AND OAUTH II.mp4
480 kB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/16. JAVASCRIPT WEB TOKENS.mp4
3.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/17. ATTACKERS VIEW OF JWTS.mp4
2.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/18. BEARER AUTHENTICATIONS.mp4
1.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/19. SAML.mp4
6.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/20. IDENTIFYING SAML.mp4
1.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/21. EXAMPLE SAML MESSAGE.mp4
1.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/22. ATTACKERS VIEW OF SAML.mp4
2.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/23. SAML WORKFLOWS.mp4
1.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/1. Course Roadmap 1 .mp4
92 kB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/2. GOLDEN SAML.mp4
3.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/3. SAML AND ADFS FLOW.mp4
1.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/4. SHIMIT.mp4
2.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/5. SHIMIT EXAMPLE.mp4
1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/6. Course Roadmap 2.mp4
220 kB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/7. LAB 32 APIS AND POSTMAN.mp4
36 MB
VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/1. Course Roadmap.mp4
240 kB
VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/2. MAPPING AZURE URLS 1.mp4
1.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/3. MAPPING AZURE URLS 2.mp4
2.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/4. AZURE FILES.mp4
3.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/5. IDENTITIES WITH AZURE FILES AND ONPREMISE SERVICES.mp4
1.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/1. Course Roadmap 1 .mp4
468 kB
VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/2. AZURE VMS.mp4
4.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/3. VIRTUAL MACHINES COMMON COMMANDS.mp4
2.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/4. WORKING WITH DISKS IN AZURE.mp4
2.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/5. AZURE STORAGE EXPLORER AND DISM.mp4
1.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/6. Course Roadmap 2.mp4
180 kB
VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/7. LAB 33 AZURE VMS.mp4
102 MB
VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/1. Course Roadmap 1 .mp4
764 kB
VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/2. AZURE SERVERLESS.mp4
3.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/3. ATTACKERS VIEW OF WINDOWS FUNCTIONS.mp4
2.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/4. ATTACKING SERVERLESS FUNCTIONS.mp4
3.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/5. Course Roadmap 2.mp4
92 kB
VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/6. LAB 34 ATTACKING AZURE FUNCTIONS.mp4
22 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/1. Course Roadmap 1 .mp4
711 kB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/2. CODE EXECUTION ON WINDOWS.mp4
2.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/3. CUSTOM SCRIPT EXTENSION.mp4
3.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/4. EXECUTING COMMANDS THROUGH RUNCOMMAND.mp4
3.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/5. HYBRID WORKERS.mp4
2.0 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/6. HYBRID WORKERS WATCHERS.mp4
1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/7. WINRM.mp4
5.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/8. Course Roadmap 2.mp4
229 kB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/9. LAB 35 RUNNING COMMANDS ON VMS.mp4
29 MB
VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/1. Course Roadmap.mp4
502 kB
VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/2. WINDOWS CONTAINERS.mp4
4.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/3. DOCKER AND WINDOWS.mp4
3.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/4. MAJOR DIFFERENCES BETWEEN LINUX AND WINDOWS CONTAINERS.mp4
3.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/5. ATTACKERS VIEW OF WINDOWS CONTAINERS.mp4
4.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/1. Course Roadmap 1 .mp4
92 kB
VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/2. MIMIKATZ.mp4
2.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/3. MIMIKATZ SHELL.mp4
2.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/4. MIMIKATZ MODULES.mp4
1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/5. WINDOWS CONTAINERS AND MIMIKATZ.mp4
3.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/6. Course Roadmap 2.mp4
507 kB
VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/7. LAB 36 WINDOWS CONTAINERS LAB.mp4
32 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/1. Course Roadmap 1 .mp4
479 kB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/2. MICROSOFT GRAPH INTRODUCTION.mp4
4.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/3. MICROSOFT GRAPH CONSTRAINTS.mp4
3.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/4. MICROSOFT GRAPH PERMISSION EXAMPLE.mp4
1.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/5. POSTMAN AND MICROSOFT GRAPH.mp4
1.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/6. USING THE GRAPH API FOR SEARCH.mp4
4.2 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/7. Course Roadmap 2.mp4
848 kB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/8. LAB 37 POSTMAN AND MICROSOFT GRAPH API.mp4
67 MB
VoD 2020/3. Azure and Windows Services in the Cloud/12. Conclusion/1. Course Roadmap.mp4
92 kB
VoD 2020/3. Azure and Windows Services in the Cloud/12. Conclusion/2. SECTION 3 CONCLUSION.mp4
1.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/12. Conclusion/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4
306 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/1. Vulnerabilities in Cloud Native Applications.mp4
686 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/2. TABLE OF CONTENTS I.mp4
2.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/3. TABLE OF CONTENTS II.mp4
1.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/4. Course Roadmap.mp4
106 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/5. WHY FOCUS ON WEB APPLICATIONS.mp4
3.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/6. CLOUD NATIVE APPLICATIONS.mp4
3.2 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/1. Course Roadmap.mp4
106 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/2. CNCF TRAILMAP.mp4
4.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/3. CLOUD NATIVE APPLICATION ARCHITECTURES.mp4
2.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/4. HOW APPLICATIONS TALK CLASSIC.mp4
1.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/5. HOW CLOUD APPLICATIONS TALK CLOUD NATIVE.mp4
3.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/6. THE ARCHITECTURE FOR THIS SECTION.mp4
1.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/1. Course Roadmap.mp4
589 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/2. DEPLOYMENT PIPELINES.mp4
2.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/3. BUILD SYSTEMS.mp4
3.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/4. DETECTING CICD TOOLS.mp4
1.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/5. ATTACKING CICD TOOLS.mp4
2.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/6. TRAVIS EXAMPLE.mp4
1.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/7. TRAVIS CONFIGURATION FILES.mp4
2.4 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/8. USING TRAVIS TO MOVE LATERALLY.mp4
1.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/9. TIPS ON OUTPUT.mp4
1020 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/1. Course Roadmap 1.mp4
908 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/2. NGROK.mp4
950 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/3. NGROK OPTIONS.mp4
4.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/4. SEVERAL USE CASES.mp4
1.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/5. EXAMPLE SCRIPTS.mp4
3.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/6. Course Roadmap 2.mp4
487 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/7. LAB 41 ABUSING CICD PIPELINES.mp4
35 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/5. Web Application Injections/1. Course Roadmap.mp4
254 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/5. Web Application Injections/2. INJECTIONS.mp4
2.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/1. Course Roadmap 1.mp4
105 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/2. SSRFS.mp4
3.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/3. WHY ARE SSRFS POPULAR AGAIN.mp4
1.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/4. SSRF DISCOVERY.mp4
4.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/5. SSRF IMPLICATIONS.mp4
1.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/6. METADATAV2 TOKEN PROTECTIONS.mp4
2.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/7. SSRFS IN THE WILD.mp4
2.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/8. Course Roadmap 2.mp4
106 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/9. LAB 42 SSRFS.mp4
30 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/3. COMMAND LINE EXECUTION EXAMPLE.mp4
2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/4. EXPLOITING COMMAND INJECTIONS.mp4
3.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/5. COMMAND INJECTION PRIMITIVES.mp4
2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/6. COMMAND INJECTION AND CLOUD NATIVE.mp4
4.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/7. FINDING COMMAND INJECTIONS.mp4
3.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/8. Course Roadmap 2.mp4
247 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/9. LAB 43 COMMAND LINE INJECTIONS.mp4
78 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/1. Course Roadmap 1.mp4
360 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/2. SERVERLESS COMPUTING COMPUTE RUNTIMES.mp4
3.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/3. AWS LAMBDA.mp4
2.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/4. NODEJS LAMBDA EXAMPLE.mp4
2.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/5. EXPLOITS IN LAMBDA SOFTWARE.mp4
5.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/6. AWS LAMBDA SHELLS.mp4
1.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/7. Course Roadmap 2.mp4
634 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/8. LAB 44 SERVERLESS ATTACKS.mp4
51 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/1. Course Roadmap 1.mp4
328 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/2. DATABASES IN CLOUD ENVIRONMENTS.mp4
6.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/3. AMAZON RDS AND AURORA.mp4
2.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/4. RDS DESIGN.mp4
1.2 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/5. SQL INJECTION.mp4
2.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/6. SQL INJECTION WORKFLOW.mp4
2.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/7. SQL INJECTION VISUALIZED IN NODEJS 1.mp4
3.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/8. SQL INJECTION VISUALIZED IN NODEJS 2.mp4
571 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/9. SQL INJECTION VISUALIZED IN NODEJS 3.mp4
1.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/10. SQLMAP.mp4
1.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/11. SQLMAPPY.mp4
1.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/12. SQLMAP AND CLOUD APPLICATIONS.mp4
2.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/13. SQLMAP EXAMPLES.mp4
3.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/14. SQL INJECTION DEFENSES.mp4
2.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/15. Course Roadmap 2.mp4
243 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/16. LAB 45 SQL INJECTIONS.mp4
59 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/1. Course Roadmap.mp4
324 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/2. APPLICATION DEPLOYMENT STRATEGIES.mp4
3.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/3. CONTAINERS AND APPLICATION DEPLOYMENT.mp4
4.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/4. CONTAINER ARCHITECTURES VISUALIZED LINUX.mp4
2.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/5. CONTAINER ARCHITECTURES VISUALIZED WINDOWS SERVER.mp4
965 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/6. CONTAINERS SIMPLIFY APP DEPLOYMENTS.mp4
1.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/7. DOCKERFILE.mp4
3.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/8. CONTAINER CROSS COMMUNICATION.mp4
1.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/9. MICROSERVICES AND CLOUD NATIVE APPLICATIONS.mp4
2.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/1. Course Roadmap 1.mp4
267 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/2. KUBERNETES.mp4
804 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/3. KUBERNETES ARCHITECTURE I.mp4
1.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/4. KUBERNETES ARCHITECTURE II.mp4
2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/5. KUBERNETES NODES.mp4
2.2 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/6. KUBERNETES ARCHITECTURE III.mp4
1.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/7. CERTIFICATE USAGE IN KUBERNETES.mp4
2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/8. ATTACKERS VIEW OF THE KUBERNETES.mp4
1.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/9. KUBERNETES TYPES OF DEPLOYMENTS.mp4
2.2 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/10. KUBERNETES CONTROL PLANE.mp4
1.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/11. PODS.mp4
2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/12. PRIVILEGED PODS.mp4
1.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/13. KEEPING SECRETS IN KUBERNETES.mp4
995 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/14. TELSA EXAMPLE.mp4
1.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/15. RBAC.mp4
2.2 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/16. RBAC EXAMPLE.mp4
4.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/17. RBAC ESCALATIONS.mp4
1.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/18. VULNERABILITY HUNTING IN KUBERNETES.mp4
2.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/19. AUTOMATED ATTACK WITH PEIRATES.mp4
1.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/20. PEIRATES OPTIONS.mp4
956 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/21. Course Roadmap 2.mp4
106 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/22. LAB 46 PEIRATES LAB.mp4
101 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/23. Course Roadmap 3.mp4
106 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/24. WRAPPING UP SECTION 4.mp4
110 kB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/25. COURSE RESOURCES AND CONTACT INFORMATION.mp4
80 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/1. Exploitation and Red Team in the Cloud.mp4
1006 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/2. TABLE OF CONTENTS I.mp4
2.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/3. TABLE OF CONTENTS II.mp4
891 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/4. Course Roadmap.mp4
240 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/5. RED TEAM AND EXPLOITATION.mp4
1.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/6. WHY DISCUSS RED TEAM.mp4
1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/7. RED TEAM AND THE CLOUD.mp4
1.9 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/8. DIFFICULTY IN BLOCKING CLOUD SERVICE PROVIDERS.mp4
4.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/1. Course Roadmap 1.mp4
627 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/2. CHALLENGES WITH TRADITIONAL PAYLOADS.mp4
3.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/3. GETTING PAYLOADS ONTO SYSTEMS.mp4
2.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/4. PAYLOAD RENAISSANCE.mp4
3.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/5. TRADITIONAL PAYLOADS FOR PENETRATION TESTING FRAMEWORKs.mp4
1.9 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/6. BEACONBASED PAYLOADS.mp4
1.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/7. ADVANCED C2 ARCHITECTURES.mp4
1.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/8. WEB SHELLS.mp4
2.9 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/9. HEAVY SHELL EXAMPLES.mp4
1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/10. LIGHTWEIGHT SHELLS.mp4
2.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/11. LIGHT AND HEAVY SHELLS VISUALIZED.mp4
1021 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/12. DESIGN CHOICES AND CONSIDERATION FOR PAYLOADS.mp4
2.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/13. CHOICES FOR RESTRICTIONS.mp4
2.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/14. Course Roadmap 2.mp4
403 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/15. LAB 51 LIGHTWEIGHT AND HEAVYWEIGHT WEBSHELLS.mp4
31 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/1. Course Roadmap.mp4
595 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/2. RED TEAM OPS IN THE CLOUD.mp4
1.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/3. LEVERAGE CSP NETWORKING OPTIONS.mp4
4.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/4. PROXYCANNONNG.mp4
1.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/1. Course Roadmap 1.mp4
269 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/2. BACKDOORING CONTAINERS.mp4
3.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/3. AUTOSSH CONTAINER.mp4
1.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/4. METASPLOIT.mp4
1.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/5. NAVIGATING THE METASPLOIT FRAMEWORK.mp4
2.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/6. INTRODUCTION TO METERPRETER.mp4
2.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/7. EXPLOIT MULTI HANDLER.mp4
2.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/8. STAGED AND STAGELESS PAYLOADS.mp4
2.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/9. SETTING UP BOTH STAGELESS AND STAGED METERPRETER.mp4
2.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/10. BUILDING PAYLOADS.mp4
2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/11. KUBERNETES AND METERPRETER.mp4
1.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/12. BACKDOOR CONTAINER WORKFLOW.mp4
2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/13. KUBERNETES AND THE PAYLOAD.mp4
1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/14. EXAMPLE DEPLOYMENT YAML.mp4
1.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/15. Course Roadmap 2.mp4
355 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/16. LAB 52 BACKDOORING CONTAINERS.mp4
41 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/1. Course Roadmap.mp4
283 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/2. DATA PIVOTING OPTIONS.mp4
1.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/3. AWS CROSSACCOUNT COPIES.mp4
1.9 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/4. ATTACKER ACCOUNT IAM PERMISSIONS.mp4
920 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/5. EXFILTRATION BETWEEN BUCKETS.mp4
737 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/6. AZURE CROSS ACCOUNT COPIES.mp4
1.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/7. SMUGGLING WITH ENTERPRISE TOOLS.mp4
1.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/8. MICROSOFT ONEDRIVE.mp4
1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/1. Course Roadmap 1.mp4
471 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/2. USERNAME HARVESTING IN THE CLOUD.mp4
2.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/3. CLOUD LANDING PAGE ABUSE.mp4
1.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/4. Course Roadmap 2.mp4
1.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/5. LAB 53 USERNAME AND PIVOT SETUP.mp4
28 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/1. Course Roadmap.mp4
370 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/2. PASSWORDS.mp4
1.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/3. MULTIPLE ATTACK METHODS FOR PASSWORDS.mp4
1.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/4. PASSWORD LISTS AND WORDLISTS.mp4
2.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/5. CEWL AND CUSTOM WORDLISTS.mp4
2.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/1. Course Roadmap 1.mp4
106 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/2. PASSWORD ATTACK TYPES AND METHODOLOGY.mp4
1.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/3. MOUNTING A BRUTE FORCE ATTACK.mp4
1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/4. MOUNTING A DICTIONARY ATTACK.mp4
1.7 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/5. MOUNTING A PASSWORD SPRAYING ATTACK.mp4
2.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/6. MOUNTING A CREDENTIAL STUFFING ATTACK.mp4
1.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/7. ACCOUNT ATTACK METHODOLOGY.mp4
1.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/8. USERNAME STRUCTURES.mp4
1.7 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/9. CREDENTIAL STUFFING ATTACK TOOLS.mp4
940 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/10. THCHYDRA.mp4
2.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/11. THCHYDRA SYNTAX AND EXAMPLES.mp4
2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/12. PWINSPECTOR.mp4
1.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/13. Course Roadmap 2.mp4
445 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/14. LAB 54 CREDENTIAL STUFFING AND PASSWORD.mp4
26 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/1. Course Roadmap 1.mp4
515 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/2. OBFUSCATION OF C2 INFRASTRUCTURE.mp4
2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/3. FINDING VALID DOMAINS WITH DOMAIN HUNTER.mp4
5.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/4. DOMAIN HUNTER SYNTAX.mp4
2.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/5. BUYING GOOD WEB PROPERTIES FLIPPA.mp4
2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/6. DOMAIN FRONTING.mp4
3.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/7. DOMAIN FRONTING VISUALIZED.mp4
1.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/8. DOMAIN FRONTING METHODOLOGY.mp4
3.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/9. METASPLOIT AND VALID CRYPTOGRAPHY.mp4
1.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/10. USING VALID CERTIFICATES IN METASPLOIT.mp4
2.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/11. PIVOTING WITH HTTP.mp4
1.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/12. Course Roadmap 2.mp4
106 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/13. LAB 55 C2 REDIRECTIONS.mp4
31 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/1. Course Roadmap 1.mp4
764 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/2. REDIRECTIONS OR OTHER PIVOTS.mp4
977 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/3. INTRODUCTION TO SOCAT.mp4
1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/4. SOCAT ADDRESS FORMAT.mp4
2.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/5. SOCAT EXAMPLES.mp4
2.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/6. USING PORT PROXIES WITH BUILT IN TOOLS.mp4
1.7 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/7. IPTABLES AS A REDIRECTION TOOL.mp4
2.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/8. WINDOWS PORTPROXY.mp4
1.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/9. Course Roadmap 2.mp4
754 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/10. LAB 56 SOCKET AND OS REDIRECTIONS .mp4
34 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/11. Class Conclusions/1. Course Roadmap.mp4
106 kB
VoD 2020/5. Exploitation and Red Team in the Cloud/11. Class Conclusions/2. WRAPPING UP SECTION 5.mp4
1.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/11. Class Conclusions/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4
438 kB
VoD 2020/6. Capstone Event/1. Capstone Event/1. Capstone Event.mp4
577 kB
VoD 2020/6. Capstone Event/1. Capstone Event/2. CAPSTONE EVENT RULES.mp4
76 MB
VoD 2020/6. Capstone Event/1. Capstone Event/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4
82 kB