SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/7. LAB 33 AZURE VMS.mp4 107.5 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/22. LAB 46 PEIRATES LAB.mp4 106.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/13. LAB 13 PORTSCANS IN THE CLOUD.mp4 82.5 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/9. LAB 43 COMMAND LINE INJECTIONS.mp4 81.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/8. LAB 14 FINDING SECRETS IN GIT.mp4 72.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/8. LAB 37 POSTMAN AND MICROSOFT GRAPH API.mp4 70.2 MB
SEC588 PDF/SEC588 Book hide01.cyou @SansPentest linuxia.ir.pdf 64.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/16. LAB 45 SQL INJECTIONS.mp4 61.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/10. LAB 12 CLOUD DISCOVERY LAB.mp4 58.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/12. LAB 24 AMAZON IAM PRIVILEGE ESCALATIONS PART 1.mp4 53.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/8. LAB 44 SERVERLESS ATTACKS.mp4 53.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/14. LAB 15 DATABASES AND EXPOSED PORTS.mp4 52.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/7. LAB 23 MAPPING WITH COMMONSPEAK2.mp4 51.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/16. LAB 52 BACKDOORING CONTAINERS.mp4 43.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/7. LAB 25 AMAZON IAM PRIVILEGE ESCALATIONS PART 2.mp4 40.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/7. LAB 32 APIS AND POSTMAN.mp4 37.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/7. LAB 41 ABUSING CICD PIPELINES.mp4 37.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/10. LAB 56 SOCKET AND OS REDIRECTIONS .mp4 35.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/7. LAB 36 WINDOWS CONTAINERS LAB.mp4 33.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/15. LAB 51 LIGHTWEIGHT AND HEAVYWEIGHT WEBSHELLS.mp4 32.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/13. LAB 55 C2 REDIRECTIONS.mp4 32.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/9. LAB 11 ACCESSING OUR CLOUD ASSETS.mp4 31.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/8. LAB 16 EYEWITNESS IN THE CLOUD.mp4 31.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/18. LAB 31 AZURE AD AND RBAC ROLES.mp4 30.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/9. LAB 35 RUNNING COMMANDS ON VMS.mp4 30.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/5. LAB 53 USERNAME AND PIVOT SETUP.mp4 29.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/14. LAB 54 CREDENTIAL STUFFING AND PASSWORD.mp4 26.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/6. LAB 34 ATTACKING AZURE FUNCTIONS.mp4 23.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/1. Discovery Recon and Architecture at Scale.mp4 8.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/5. AMAZON ARN.mp4 8.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/2. MAPPING AND DISCOVERING SUBDOMAINS AND ROUTES.mp4 7.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/1. Azure and Windows Services in the Cloud.mp4 7.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/2. DATABASES IN CLOUD ENVIRONMENTS.mp4 7.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/19. SAML.mp4 7.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/11. TIPS MAPPING IN AWS AND AZURE.mp4 6.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/4. TIPS AND TRICKS DOMAINS INTERNET DATA DOWNLOAD.mp4 6.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/9. UNDERSTANDING FILESYSTEMS IN THE CLOUD.mp4 6.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/4. WORKING WITH AWS SERVICES.mp4 6.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/7. WINRM.mp4 5.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/4. FILES SECRETS FORMAT.mp4 5.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/5. INTRODUCTION TO MICROSOFT CLOUD SERVICES.mp4 5.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/2. TABLE OF CONTENTS 1.mp4 5.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/3. FINDING VALID DOMAINS WITH DOMAIN HUNTER.mp4 5.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/3. HIGHLEVEL VIEW OF IDENTITY IN MICROSOFT.mp4 5.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/4. WHY OAUTH.mp4 5.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/2. PORT SCANNING AT WEBSCALE.mp4 5.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/6. COMPARISON OF SERVICE NAMES BETWEEN EACH PROVIDERS.mp4 5.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/5. EXPLOITS IN LAMBDA SOFTWARE.mp4 5.2 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/4. IDENTITY TYPES ON AWS.mp4 5.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/16. RBAC EXAMPLE.mp4 5.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/6. COMMAND INJECTION AND CLOUD NATIVE.mp4 5.1 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/5. IAM POLICY EXAMPLE.mp4 5.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/6. ENV EXAMPLE.mp4 5.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/9. UNIQUE PROPERTIES OF CLOUD COMPUTING.mp4 4.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/3. DISCOVERING EXPOSED SERVICES.mp4 4.9 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/3. CONTAINERS AND APPLICATION DEPLOYMENT.mp4 4.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/2. WINDOWS CONTAINERS.mp4 4.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/5. ATTACKERS VIEW OF WINDOWS CONTAINERS.mp4 4.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/2. MICROSOFT GRAPH INTRODUCTION.mp4 4.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/3. LEVERAGE CSP NETWORKING OPTIONS.mp4 4.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/8. WHY CLOUD PENETRATION TESTING.mp4 4.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/2. AZURE VMS.mp4 4.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/7. ON PREMISE AZURE AND AWS ROLE COMPARISONS.mp4 4.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/8. DIFFICULTY IN BLOCKING CLOUD SERVICE PROVIDERS.mp4 4.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/5. CERTIFICATES REVIEW.mp4 4.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/10. CLOUD COMPUTING PROPERTIES.mp4 4.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/3. SURFACE AREA INCREASE TIPS AND TRICKS DOMAINS.mp4 4.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/6. USING THE GRAPH API FOR SEARCH.mp4 4.4 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/7. COMBINING JQ AND AWS.mp4 4.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/5. COMMONSPEAK2 EXAMPLE OF SUBDOMAIN QUERY.mp4 4.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/5. WINDOWS CONTAINERS AND MIMIKATZ.mp4 4.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/2. GOLDEN SAML.mp4 4.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/8. AZURE ACTIVE DIRECTORY DOMAIN SERVICES.mp4 4.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/7. DOCKERFILE.mp4 4.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/5. EXAMPLE SCRIPTS.mp4 4.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/4. MAJOR DIFFERENCES BETWEEN LINUX AND WINDOWS CONTAINERS.mp4 4.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/8. DOMAIN FRONTING METHODOLOGY.mp4 4.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/7. ABOUT THIS COURSE.mp4 3.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/2. APPLICATION DEPLOYMENT STRATEGIES.mp4 3.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/4. COMMONSPEAK2 COMMANDS.mp4 3.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/10. NMAP NSE.mp4 3.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/9. PACU EVASIONS.mp4 3.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/3. IAM AND PRIVILEGE ESCALATION ISSUES.mp4 3.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/7. ATTACKING PLATFORM AS A SERVICE.mp4 3.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/7. OAUTH V1 TERMINOLOGY.mp4 3.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/4. AZURE FILES.mp4 3.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/2. CHALLENGES WITH TRADITIONAL PAYLOADS.mp4 3.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/7. FINDING COMMAND INJECTIONS.mp4 3.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/7. MASSCAN WORKFLOW.mp4 3.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/6. AZURE ACTIVE DIRECTORY.mp4 3.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/16. JAVASCRIPT WEB TOKENS.mp4 3.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/13. SQLMAP EXAMPLES.mp4 3.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/4. EXECUTING COMMANDS THROUGH RUNCOMMAND.mp4 3.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/3. DOCKER AND WINDOWS.mp4 3.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/2. DEVELOPER WORKFLOW.mp4 3.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/3. CUSTOM SCRIPT EXTENSION.mp4 3.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/8. DNSRECONPY OUTPUT AND LARGE LISTS.mp4 3.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/9. MAPPING THE TOTAL INFRASTRUCTURE.mp4 3.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/3. SANS CLOUD PENETRATION TESTING METHODOLOGY.mp4 3.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/9. AZURE LOGIN OPTIONS.mp4 3.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/3. MICROSOFT GRAPH CONSTRAINTS.mp4 3.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/14. APPLICATION MAPPING VS INFRASTRUCTURE MAPPING.mp4 3.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/5. DEMARCATION POINTS IN A PUBLIC CLOUD ENVIRONMENT.mp4 3.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/3. ATTACKERS VIEW OF URIS AND RFC 3986.mp4 3.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/4. PUBLIC CLOUD ASSESSMENTS.mp4 3.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/7. CONNECTING TO CLOUD DATABASES.mp4 3.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/13. OPENID CONNECT.mp4 3.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/10. FLOW TYPES.mp4 3.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/6. CLOUD NATIVE APPLICATIONS.mp4 3.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/2. A WORD ON CLOUD ARCHITECTURES AND FEATURES.mp4 3.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/11. TYPES OF CLOUDS.mp4 3.4 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/10. TIPS FOR INFRASTRUCTURE MAPPING 1.mp4 3.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/2. BACKDOORING CONTAINERS.mp4 3.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/6. AWS IAM VISUALIZED.mp4 3.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/9. NMAP TOUR.mp4 3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/2. SERVERLESS COMPUTING COMPUTE RUNTIMES.mp4 3.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/4. ATTACKING SERVERLESS FUNCTIONS.mp4 3.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/2. AZURE SERVERLESS.mp4 3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/3. BUILD SYSTEMS.mp4 3.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/6. DOMAIN FRONTING.mp4 3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/7. SQL INJECTION VISUALIZED IN NODEJS 1.mp4 3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/5. WHY FOCUS ON WEB APPLICATIONS.mp4 3.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/7. SERVICE ORCHESTRATION KUBERNETES.mp4 3.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/4. PAYLOAD RENAISSANCE.mp4 3.2 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/8. AWS INSTANCE METADATA SERVICE.mp4 3.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/5. MICROSOFT ACTIVE DIRECTORY FEDERATED SERVICES.mp4 3.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/4. EXPLOITING COMMAND INJECTIONS.mp4 3.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/4. MASSCAN SCAN OPTIONS 1.mp4 3.1 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/3. PACU INTERFACE.mp4 3.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/7. SSRFS IN THE WILD.mp4 3.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/8. WEB SHELLS.mp4 3.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/5. Web Application Injections hide01.cyou @SansPentest linuxia.ir/2. INJECTIONS.mp4 3.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/6. DNSRECONPY.mp4 3.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/4. SOCAT ADDRESS FORMAT.mp4 3.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/3. ATTACKERS VIEW OF WINDOWS FUNCTIONS.mp4 3.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/2. TABLE OF CONTENTS I.mp4 2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/17. ATTACKERS VIEW OF JWTS.mp4 2.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/5. SOCAT EXAMPLES.mp4 2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/5. OAUTH AND BEARER AUTHENTICATION.mp4 2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/4. WORKING WITH DISKS IN AZURE.mp4 2.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/10. USING VALID CERTIFICATES IN METASPLOIT.mp4 2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/3. VIRTUAL MACHINES COMMON COMMANDS.mp4 2.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/9. THE ATTACKERS VIEW OF PUBLIC IAAS VISUALIZED.mp4 2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/7. AZURE ACTIVE DIRECTORY ROLES.mp4 2.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/5. MASSCAN TESTING THEORETICAL LIMITS.mp4 2.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/3. MAPPING AZURE URLS 2.mp4 2.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/12. TIPS FOR INFRASTRUCTURE MAPPING 2.mp4 2.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/5. ATTACKING CICD TOOLS.mp4 2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/2. VISUALIZATIONS DURING RECON.mp4 2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/5. SUBSET OF USEFUL STRINGS TO SEARCH FOR.mp4 2.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/4. NODEJS LAMBDA EXAMPLE.mp4 2.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/3. AWS LAMBDA.mp4 2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/3. GOBUSTER.mp4 2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/6. ACME AND LETS ENCYPT.mp4 2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/5. GOBUSTER OUTPUT.mp4 2.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/5. CEWL AND CUSTOM WORDLISTS.mp4 2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/3. GIT.mp4 2.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/4. CONTAINER ARCHITECTURES VISUALIZED LINUX.mp4 2.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/7. INTRIGUE IDENT.mp4 2.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/7. IPTABLES AS A REDIRECTION TOOL.mp4 2.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/13. MAPPING VISUALIZED MULTIPLE LAYERS OF ABSTRACTION.mp4 2.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/4. DOMAIN HUNTER SYNTAX.mp4 2.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/14. SQL INJECTION DEFENSES.mp4 2.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/8. STAGED AND STAGELESS PAYLOADS.mp4 2.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/7. DNSRECONPY RUNNING DNSRECON.mp4 2.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/7. TRAVIS CONFIGURATION FILES.mp4 2.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/3. MIMIKATZ SHELL.mp4 2.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/12. DESIGN CHOICES AND CONSIDERATION FOR PAYLOADS.mp4 2.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/2. SANS PENETRATION TESTING CURRICULUM.mp4 2.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/4. GOBUSTER SYNTAX.mp4 2.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/9. AWS SESSION TOKENS.mp4 2.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/8. CERTIFICATE TRANSPARENCY FOR HOST DISCOVERY.mp4 2.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/11. OAUTH V2 AUTHORIZATION CODE FLOW CLIENTSIDE.mp4 2.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/10. LIGHTWEIGHT SHELLS.mp4 2.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/4. DATABASES IN THE CLOUD.mp4 2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/2. TABLE OF CONTENTS I.mp4 2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/5. SQL INJECTION.mp4 2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/6. INTRODUCTION TO METERPRETER.mp4 2.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/6. MASSCAN TCP CONNECTIONS VS NMAP.mp4 2.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/9. ATTACKERS VIEW OF IDENTITY SERVICES IN AZURE.mp4 2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/2. DEPLOYMENT PIPELINES.mp4 2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/3. AMAZON RDS AND AURORA.mp4 2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/5. MOUNTING A PASSWORD SPRAYING ATTACK.mp4 2.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/6. SQL INJECTION WORKFLOW.mp4 2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/9. SETTING UP BOTH STAGELESS AND STAGED METERPRETER.mp4 2.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/7. EXPLOIT MULTI HANDLER.mp4 2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/9. OAUTH V2.mp4 2.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/15. RBAC.mp4 2.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/2. INTRODUCTION TO PACU.mp4 2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/6. OAUTH V1.mp4 2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/8. AZURE CLI.mp4 2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/2. MICROSOFT IDENTITY SERVICES.mp4 2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/22. ATTACKERS VIEW OF SAML.mp4 2.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/2. USERNAME HARVESTING IN THE CLOUD.mp4 2.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/9. KUBERNETES TYPES OF DEPLOYMENTS.mp4 2.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/5. KUBERNETES NODES.mp4 2.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/5. EYEWITNESS COMMAND LINE SYNTAX.mp4 2.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/4. PASSWORD LISTS AND WORDLISTS.mp4 2.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/3. GETTING PAYLOADS ONTO SYSTEMS.mp4 2.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/10. ATTACKERS VIEW OF AD CONNECTOR.mp4 2.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/12. MONGODB COMMAND CHEAT SHEET.mp4 2.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/10. THCHYDRA.mp4 2.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/5. NAVIGATING THE METASPLOIT FRAMEWORK.mp4 2.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/11. SQL VS MONGODB A PRIMER.mp4 2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/7. CERTIFICATE USAGE IN KUBERNETES.mp4 2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/11. PODS.mp4 2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/4. KUBERNETES ARCHITECTURE II.mp4 2.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/13. CHOICES FOR RESTRICTIONS.mp4 2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/3. COMMAND LINE EXECUTION EXAMPLE.mp4 2.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/11. AZURE AD RBAC ROLES.mp4 2.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/2. CODE EXECUTION ON WINDOWS.mp4 2.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/5. COMMAND INJECTION PRIMITIVES.mp4 2.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/5. BUYING GOOD WEB PROPERTIES FLIPPA.mp4 2.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/5. HYBRID WORKERS.mp4 2.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/18. VULNERABILITY HUNTING IN KUBERNETES.mp4 2.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/13. AZURE AD SCOPE.mp4 2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/12. BACKDOOR CONTAINER WORKFLOW.mp4 2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/11. THCHYDRA SYNTAX AND EXAMPLES.mp4 2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/10. BUILDING PAYLOADS.mp4 2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/2. OBFUSCATION OF C2 INFRASTRUCTURE.mp4 2.1 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/7. AZURE POLICIES RESTRICTIONS.mp4 2.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/12. SQLMAP AND CLOUD APPLICATIONS.mp4 2.1 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/10. IMPACT OF EXPOSING THESE INJECTIONS.mp4 2.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/3. AWS CROSSACCOUNT COPIES.mp4 2.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/7. RED TEAM AND THE CLOUD.mp4 2.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/11. SQLMAPPY.mp4 2.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/13. WRAPPING UP SECTION 2.mp4 2.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/5. IDENTITIES WITH AZURE FILES AND ONPREMISE SERVICES.mp4 2.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/3. MASSCAN DEFAULT SYNTAX.mp4 2.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/5. TRADITIONAL PAYLOADS FOR PENETRATION TESTING FRAMEWORKs.mp4 2.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/5. INTRIGUE DESIGN.mp4 2.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/6. CONTAINERS SIMPLIFY APP DEPLOYMENTS.mp4 2.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/2. WHY FOCUS ON AUTHENTICATION STANDARDS.mp4 2.0 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/10. ATTRIBUTE BASED ACCESS CONTROL.mp4 2.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/4. MICROSOFT TRADITIONAL ACTIVE DIRECTORY.mp4 2.0 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/20. IDENTIFYING SAML.mp4 2.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/5. PAID EXTRAS REDISLABS.mp4 1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/2. TESTING POLICIES PUBLIC CLOUD SERVICE PROVIDERS IAAS.mp4 1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/3. Infrastructure Cloud Components hide01.cyou @SansPentest linuxia.ir/2. INTERACTING WITH BASIC INFRASTRUCTURE CLOUD COMPONENTS.mp4 1.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/3. WEB AUTHENTICATION STANDARDS.mp4 1.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/8. WINDOWS PORTPROXY.mp4 1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/2. DOMAIN ENUMERATION TOOLS.mp4 1.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/14. EXAMPLE DEPLOYMENT YAML.mp4 1.9 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/8. ATTACKERS VIEW OF THE KUBERNETES.mp4 1.9 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/6. AWS LAMBDA SHELLS.mp4 1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/4. EYEWITNESS.mp4 1.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/21. EXAMPLE SAML MESSAGE.mp4 1.9 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/6. AWS IAM/7. IDENTITY VS RESOURCE POLICIES.mp4 1.9 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/2. PASSWORD ATTACK TYPES AND METHODOLOGY.mp4 1.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/6. A WORD ON SQL INJECTION VS NOSQL INJECTION.mp4 1.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/6. BEACONBASED PAYLOADS.mp4 1.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/8. USING TRAVIS TO MOVE LATERALLY.mp4 1.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/4. DETECTING CICD TOOLS.mp4 1.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/8. USERNAME STRUCTURES.mp4 1.8 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/4. MOUNTING A DICTIONARY ATTACK.mp4 1.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/5. POSTMAN AND MICROSOFT GRAPH.mp4 1.8 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/6. ATTACKING SOFTWARE AS A SERVICE.mp4 1.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/6. ServerSide Request Forgeries/3. WHY ARE SSRFS POPULAR AGAIN.mp4 1.8 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/4. MICROSOFT GRAPH PERMISSION EXAMPLE.mp4 1.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/6. PARSING JSON OUTPUT IN CLI.mp4 1.8 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/2. URL PRIMERS.mp4 1.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/14. TELSA EXAMPLE.mp4 1.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/6. USING PORT PROXIES WITH BUILT IN TOOLS.mp4 1.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/9. SQL INJECTION VISUALIZED IN NODEJS 3.mp4 1.7 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/5. AZURE STORAGE EXPLORER AND DISM.mp4 1.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/8. PACU EXPLOITS.mp4 1.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/2. DATA PIVOTING OPTIONS.mp4 1.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/3. ASSET COLLECTION FRAMEWORKS.mp4 1.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/6. KUBERNETES ARCHITECTURE III.mp4 1.7 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/4. METASPLOIT.mp4 1.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/4. AWS RESTRICTIONS.mp4 1.7 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/8. CONTAINER CROSS COMMUNICATION.mp4 1.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/4. IAM AND USER VERSIONING 1.mp4 1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/6. MOUNTING A CREDENTIAL STUFFING ATTACK.mp4 1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/12. AZURE AD ADMINISTRATOR ROLES.mp4 1.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/8. MASSCAN FOLLOWED UP BY NMAP.mp4 1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/13. KUBERNETES AND THE PAYLOAD.mp4 1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/8. MICROSOFT ONEDRIVE.mp4 1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/14. AZURE AD ROLES VIEWED.mp4 1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/3. MOUNTING A BRUTE FORCE ATTACK.mp4 1.6 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/6. PROCESS REVIEW.mp4 1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/9. HEAVY SHELL EXAMPLES.mp4 1.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/12. PRIVILEGED PODS.mp4 1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/4. MIMIKATZ MODULES.mp4 1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/6. HYBRID WORKERS WATCHERS.mp4 1.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/6. THE ARCHITECTURE FOR THIS SECTION.mp4 1.6 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/3. INTRODUCTION TO SOCAT.mp4 1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/15. AZURE RBAC VS AZURE AD ADMINS VS CROSS PLATFORM ADMINS.mp4 1.6 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/5. SHIMIT EXAMPLE.mp4 1.5 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/4. SEVERAL USE CASES.mp4 1.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/3. COMMONSPEAK2 QUERIES.mp4 1.5 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/4. POSTMAN LIMITATIONS ON THE FREE BUILD.mp4 1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/6. WHY DISCUSS RED TEAM.mp4 1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/3. MULTIPLE ATTACK METHODS FOR PASSWORDS.mp4 1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/11. KUBERNETES AND METERPRETER.mp4 1.5 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/23. SAML WORKFLOWS.mp4 1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/7. ACCOUNT ATTACK METHODOLOGY.mp4 1.5 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/11. MASSCAN NMAP WORKFLOW.mp4 1.5 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/2. PASSWORDS.mp4 1.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/18. BEARER AUTHENTICATIONS.mp4 1.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/12. PWINSPECTOR.mp4 1.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/6. AZURE CROSS ACCOUNT COPIES.mp4 1.4 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/8. EXPOSED DATABASES WHY DOES THIS MATTER PHASE I.mp4 1.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/7. ADVANCED C2 ARCHITECTURES.mp4 1.4 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/7. DOMAIN FRONTING VISUALIZED.mp4 1.4 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/10. KUBERNETES CONTROL PLANE.mp4 1.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/12. Conclusion/2. SECTION 3 CONCLUSION.mp4 1.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/2. MAPPING AZURE URLS 1.mp4 1.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/6. TRAVIS EXAMPLE.mp4 1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/11. PIVOTING WITH HTTP.mp4 1.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/3. ACCESS CLOUD SERVICE PROVIDERS AMAZON.mp4 1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/5. RED TEAM AND EXPLOITATION.mp4 1.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/5. IAM AND USER VERSIONING 2.mp4 1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/9. METASPLOIT AND VALID CRYPTOGRAPHY.mp4 1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/2. RED TEAM OPS IN THE CLOUD.mp4 1.3 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/16. AZURE AD PRIVILEGE ESCALATION.mp4 1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/3. CLOUD LANDING PAGE ABUSE.mp4 1.3 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/2. WRAPPING UP SECTION 5.mp4 1.3 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/4. RDS DESIGN.mp4 1.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/2. INCREASING ATTACK SURFACES.mp4 1.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/3. AUTOSSH CONTAINER.mp4 1.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/6. INTRIGUE COLLECTIONS.mp4 1.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/6. EYEWITNESS OUTPUT.mp4 1.2 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/6. AZURE POLICIES RULES AND PERMISSIONS.mp4 1.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/3. SAML AND ADFS FLOW.mp4 1.2 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/10. SQLMAP.mp4 1.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/7. SMUGGLING WITH ENTERPRISE TOOLS.mp4 1.2 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/8. ISSUES AND CONSIDERATIONS.mp4 1.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/17. RBAC ESCALATIONS.mp4 1.1 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/1. Course Roadmap 1.mp4 1.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/3. TABLE OF CONTENTS II.mp4 1.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/19. AUTOMATED ATTACK WITH PEIRATES.mp4 1.1 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/12. OAUTH V2 AUTHORIZATION CODE FLOW SERVERSIDE.mp4 1.1 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/3. TABLE OF CONTENTS II.mp4 1.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/4. Course Roadmap 2.mp4 1.1 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/11. LIGHT AND HEAVY SHELLS VISUALIZED.mp4 1.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/9. TIPS ON OUTPUT.mp4 1.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/8. WRAPPING UP SECTION 1.mp4 1.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/1. Exploitation and Red Team in the Cloud.mp4 1.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/13. KEEPING SECRETS IN KUBERNETES.mp4 1.0 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/3. SANS CLOUD SECURITY CURRICULUM.mp4 1.0 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/2. REDIRECTIONS OR OTHER PIVOTS.mp4 1.0 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/5. CONTAINER ARCHITECTURES VISUALIZED WINDOWS SERVER.mp4 988.2 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/20. PEIRATES OPTIONS.mp4 979.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/14. OPENID CONNECT FLOW AND OAUTH.mp4 977.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/2. NGROK.mp4 972.5 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/9. CREDENTIAL STUFFING ATTACK TOOLS.mp4 962.4 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/7. IAM PASSROLE.mp4 961.2 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/4. ATTACKER ACCOUNT IAM PERMISSIONS.mp4 941.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4 929.8 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/2. TOOLING FOR WEB APPLICATION PENETRATION TESTING.mp4 929.3 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/5. AZURE POLICIES.mp4 923.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/3. TABLE OF CONTENTS II.mp4 912.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/3. TABLE OF CONTENTS I.mp4 909.3 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/4. TABLE OF CONTENTS I.mp4 902.6 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/7. Course Roadmap 2.mp4 868.4 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/4. INTRIGUE.mp4 837.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/2. KUBERNETES.mp4 823.4 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/2. ASSET DISCOVERY AT SCALE.mp4 815.4 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/1. Course Roadmap 1.mp4 782.5 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/1. Course Roadmap 1 .mp4 782.0 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Redirections with OS Tools/9. Course Roadmap 2.mp4 772.1 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/5. EXFILTRATION BETWEEN BUCKETS.mp4 755.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/3. VISUALIZING THE SAME SITE.mp4 739.0 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/1. Course Roadmap 1 .mp4 728.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/1. Vulnerabilities in Cloud Native Applications.mp4 702.2 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/9. EXPOSED DATABASES WHY DOES THIS MATTER PHASE II.mp4 665.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/7. Course Roadmap 2.mp4 649.6 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/1. Course Roadmap 1.mp4 642.2 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/1. Course Roadmap.mp4 609.2 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/1. Course Roadmap.mp4 602.9 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/8. SQL INJECTION VISUALIZED IN NODEJS 2.mp4 584.7 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/1. Course Roadmap 1.mp4 527.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/6. Course Roadmap 2.mp4 519.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Windows Containers/1. Course Roadmap.mp4 513.8 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/6. Course Roadmap 2.mp4 498.6 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/15. OPENID CONNECT FLOW AND OAUTH II.mp4 491.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/1. Course Roadmap 1 .mp4 490.4 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Username Harvesting/1. Course Roadmap 1.mp4 482.6 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/1. Mapping Authentication and Cloud Services.mp4 481.3 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/1. Course Roadmap 1 .mp4 479.5 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/13. Course Roadmap 2.mp4 455.4 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4 448.5 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/13. Course Roadmap 2.mp4 429.6 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/14. Course Roadmap 2.mp4 412.3 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4 396.3 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/6. IAM AND USER VERSIONING 3.mp4 390.5 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/6. Course Roadmap.mp4 383.3 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/1. Course Roadmap.mp4 378.4 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4 368.6 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/15. Course Roadmap 2.mp4 363.2 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/6. Course Roadmap 2.mp4 360.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/1. Course Roadmap 1.mp4 336.4 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/10. Containers and Microservices/1. Course Roadmap.mp4 332.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4 331.2 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/1. Course Roadmap 1.mp4 319.8 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/11. Course Roadmap 2.mp4 318.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/12. Conclusion/3. COURSE RESOURCES AND CONTACT INFORMATION.mp4 313.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/1. Course Roadmap 1.mp4 308.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/1. Course Roadmap.mp4 293.4 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Data Pivots and Moving Data/1. Course Roadmap.mp4 289.8 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap 1.mp4 289.4 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/1. Course Roadmap 1.mp4 283.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/7. Course Roadmap 2.mp4 280.3 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/1. Course Roadmap 1.mp4 275.3 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/1. Course Roadmap 1.mp4 273.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/5. Web Application Injections hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4 260.6 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/8. Course Roadmap 2.mp4 253.0 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Web Authentications/1. Course Roadmap.mp4 249.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/15. Course Roadmap 2.mp4 249.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/5. Azure Files and Services/1. Course Roadmap.mp4 246.3 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/4. Course Roadmap.mp4 245.6 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/1. Course Roadmap 1.mp4 244.5 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/17. Course Roadmap 2.mp4 243.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/4. URLs and URIs hide01.cyou @SansPentest linuxia.ir/1. Course Roadmap.mp4 234.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Code Execution on Azure/8. Course Roadmap 2.mp4 234.5 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/6. Course Roadmap 2.mp4 225.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/14. COURSE RESOURCES AND CONTACT INFORMATION.mp4 225.6 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/9. COURSE RESOURCES AND CONTACT INFORMATION.mp4 224.5 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/1. Course Roadmap 1.mp4 210.3 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/4. TABLE OF CONTENTS II.mp4 191.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/1. Course Introduction and Attacking the Cloud/5. TABLE OF CONTENTS II.mp4 189.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/6. Course Roadmap 2.mp4 184.0 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/24. WRAPPING UP SECTION 4.mp4 112.5 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/1. Course Roadmap.mp4 108.9 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/12. Course Roadmap 2.mp4 108.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/7. Course Roadmap 2.mp4 108.8 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/4. Terms of Service and Demarcation Points/8. Course Roadmap 2.mp4 108.5 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/21. Course Roadmap 2.mp4 108.3 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/23. Course Roadmap 3.mp4 108.3 kB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/1. Introduction to Cloud Native Applicatons/4. Course Roadmap.mp4 108.3 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/12. Course Roadmap 2.mp4 108.2 kB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/8. Password Attack Types and Methodology/1. Course Roadmap 1.mp4 108.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Azure Functions/5. Course Roadmap 2.mp4 94.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/10. Mimikatz/1. Course Roadmap 1 .mp4 94.1 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/12. Conclusion/1. Course Roadmap.mp4 94.0 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Microsoft Identity Services/1. Course Roadmap 1 .mp4 93.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/1. Course Roadmap 1 .mp4 93.9 kB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Microsoft Cloud Services/4. Course Roadmap.mp4 93.5 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png 38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/ReadMe!!.png 38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/ReadMe!!.png 38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png 38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png 38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png 38.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/ReadMe!!.png 38.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/ReadMe.png 18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/ReadMe.png 18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/ReadMe.png 18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/ReadMe.png 18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/ReadMe.png 18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/ReadMe.png 18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/ReadMe.png 18.1 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/ReadMe.png 18.1 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/Hide01.png 15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/Hide01.png 15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/Hide01.png 15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/Hide01.png 15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/Hide01.png 15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/Hide01.png 15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/Hide01.png 15.7 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/Hide01.png 15.7 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/ReadMe!.png 5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/ReadMe!.png 5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/ReadMe!.png 5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/ReadMe!.png 5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/ReadMe!.png 5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/ReadMe!.png 5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/ReadMe!.png 5.0 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/ReadMe!.png 5.0 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/ReadMe.txt 2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/ReadMe.txt 2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/ReadMe.txt 2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/ReadMe.txt 2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/ReadMe.txt 2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/ReadMe.txt 2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/ReadMe.txt 2.9 kB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/ReadMe.txt 2.9 kB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/0. All Channell.txt 294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/0. All Channell.txt 294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/1. Mapping Process/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/8. AWS KMS hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/0. All Channell.txt 294 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/0. All Channell.txt 294 Bytes
SEC588 Video/0. All Channell.txt 294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/3. Red Team Ops in the Cloud/0. All Channell.txt 294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/2. Payloads and Payload Selections/0. All Channell.txt 294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/0. All Channell.txt 294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/7. Password Attacks/0. All Channell.txt 294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/1. Red Team Exploitation/0. All Channell.txt 294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Class Conclusions/0. All Channell.txt 294 Bytes
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/9. Obfuscating Architectures/0. All Channell.txt 294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/0. All Channell.txt 294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/3. Deployment Pipelines and Attacks/0. All Channell.txt 294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/0. All Channell.txt 294 Bytes
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/2. Cloud Native Applications hide01.cyou @SansPentest linuxia.ir/0. All Channell.txt 294 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/Website.txt 55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/10. Using Tools to Quickly Assess Environments/Website.txt 55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/2. Cloud Assessment Methodology/Website.txt 55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/Website.txt 55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/5. Recon at Cloud Scale hide01.cyou @SansPentest linuxia.ir/Website.txt 55 Bytes
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/11. Asset Discovery Services and Applications hide01.cyou @SansPentest linuxia.ir/Website.txt 55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/10. Introduction to PACU hide01.cyou @SansPentest linuxia.ir/Website.txt 55 Bytes
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/Website.txt 55 Bytes