为您索检到2条磁力链接,耗时0毫秒。搜索结果较少,你是否忘记了番号中间的-符号?
- 【影视】 SANS SEC588 - Cloud penetration testing-2022
-
收录时间:2023-12-22
文档个数:752
文档大小:2.8 GB
最近下载:2025-05-15
人气:3306
磁力链接
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/7. LAB 33 AZURE VMS.mp4 107.5 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/22. LAB 46 PEIRATES LAB.mp4 106.3 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/13. LAB 13 PORTSCANS IN THE CLOUD.mp4 82.5 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/9. LAB 43 COMMAND LINE INJECTIONS.mp4 81.7 MB
SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/2. CAPSTONE EVENT RULES.mp4 79.9 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/8. LAB 14 FINDING SECRETS IN GIT.mp4 72.9 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/8. LAB 37 POSTMAN AND MICROSOFT GRAPH API.mp4 70.2 MB
SEC588 PDF/SEC588 Book hide01.cyou @SansPentest linuxia.ir.pdf 64.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/16. LAB 45 SQL INJECTIONS.mp4 61.6 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/10. LAB 12 CLOUD DISCOVERY LAB.mp4 58.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/9. LAB 22 AWS CLI TOUR.mp4 55.4 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/12. LAB 24 AMAZON IAM PRIVILEGE ESCALATIONS PART 1.mp4 53.8 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/8. LAB 44 SERVERLESS ATTACKS.mp4 53.7 MB
SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/14. LAB 15 DATABASES AND EXPOSED PORTS.mp4 52.7 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/7. LAB 23 MAPPING WITH COMMONSPEAK2.mp4 51.2 MB
SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/16. LAB 52 BACKDOORING CONTAINERS.mp4 43.3 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/7. LAB 25 AMAZON IAM PRIVILEGE ESCALATIONS PART 2.mp4 40.1 MB
SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/15. LAB 21 HTTP AND POSTMAN TOUR.mp4 39.4 MB
SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/7. LAB 32 APIS AND POSTMAN.mp4 37.6 MB
SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/7. LAB 41 ABUSING CICD PIPELINES.mp4 37.0 MB
猜你喜欢:
SANS
SEC588
testing
penetration
2022
Cloud
- 【压缩文件】 SEC588 - Cloud Penetration Testing
-
收录时间:2024-05-02
文档个数:528
文档大小:19.1 GB
最近下载:2025-05-15
人气:5905
磁力链接
USB 2020/588.20.2.iso 16.4 GB
VoD 2020/3. Azure and Windows Services in the Cloud/6. Azure Compute/7. LAB 33 AZURE VMS.mp4 107.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/22. LAB 46 PEIRATES LAB.mp4 106.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/13. LAB 13 PORTSCANS IN THE CLOUD.mp4 82.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/9. LAB 43 COMMAND LINE INJECTIONS.mp4 81.7 MB
VoD 2020/6. Capstone Event/1. Capstone Event/2. CAPSTONE EVENT RULES.mp4 79.9 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/8. LAB 14 FINDING SECRETS IN GIT.mp4 72.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/8. LAB 37 POSTMAN AND MICROSOFT GRAPH API.mp4 70.2 MB
PDF 2020/SEC588 Book.pdf 63.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/16. LAB 45 SQL INJECTIONS.mp4 61.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/10. LAB 12 CLOUD DISCOVERY LAB.mp4 58.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/3. AWS CLI/9. LAB 22 AWS CLI TOUR.mp4 55.4 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/12. LAB 24 AMAZON IAM PRIVILEGE ESCALATIONS PART 1.mp4 53.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/8. LAB 44 SERVERLESS ATTACKS.mp4 53.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/14. LAB 15 DATABASES AND EXPOSED PORTS.mp4 52.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/7. LAB 23 MAPPING WITH COMMONSPEAK2.mp4 51.2 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/16. LAB 52 BACKDOORING CONTAINERS.mp4 43.3 MB
VoD 2020/2. Mapping Authentication and Cloud Services/9. AWS Lambda/7. LAB 25 AMAZON IAM PRIVILEGE ESCALATIONS PART 2.mp4 40.1 MB
VoD 2020/2. Mapping Authentication and Cloud Services/2. Postman/15. LAB 21 HTTP AND POSTMAN TOUR.mp4 39.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/7. LAB 32 APIS AND POSTMAN.mp4 37.6 MB
猜你喜欢:
Testing
Penetration
Cloud
SEC588