VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/18. LAB 31 AZURE AD AND RBAC ROLES.mp4 29.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/9. LAB 35 RUNNING COMMANDS ON VMS.mp4 29.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/6. Username Harvesting/5. LAB 53 USERNAME AND PIVOT SETUP.mp4 28.2 MB
PDF 2020/SEC588 Workbook.pdf 27.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/14. LAB 54 CREDENTIAL STUFFING AND PASSWORD.mp4 25.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/7. Azure Functions/6. LAB 34 ATTACKING AZURE FUNCTIONS.mp4 22.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/1. Discovery Recon and Architecture at Scale.mp4 8.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/5. AMAZON ARN.mp4 8.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/2. MAPPING AND DISCOVERING SUBDOMAINS AND ROUTES.mp4 7.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/1. Azure and Windows Services in the Cloud.mp4 7.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/2. DATABASES IN CLOUD ENVIRONMENTS.mp4 6.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/19. SAML.mp4 6.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/6. ENV EXAMPLE.mp4 4.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/9. UNIQUE PROPERTIES OF CLOUD COMPUTING.mp4 4.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/3. DISCOVERING EXPOSED SERVICES.mp4 4.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/3. CONTAINERS AND APPLICATION DEPLOYMENT.mp4 4.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/2. WINDOWS CONTAINERS.mp4 4.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/9. Windows Containers/5. ATTACKERS VIEW OF WINDOWS CONTAINERS.mp4 4.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/7. SURFACE AREA INCREASE TIPS AND TRICKS CERTIFICATE TRANSPARENCY.mp4 4.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/4. Ngrok and Connecting to External Sources/3. NGROK OPTIONS.mp4 4.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/1. Microsoft Cloud Services/9. AZURE LOGIN OPTIONS.mp4 3.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/3. MICROSOFT GRAPH CONSTRAINTS.mp4 3.3 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/14. APPLICATION MAPPING VS INFRASTRUCTURE MAPPING.mp4 3.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/5. DEMARCATION POINTS IN A PUBLIC CLOUD ENVIRONMENT.mp4 3.3 MB
VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/3. ATTACKERS VIEW OF URIS AND RFC 3986.mp4 3.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/4. PUBLIC CLOUD ASSESSMENTS.mp4 3.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/7. CONNECTING TO CLOUD DATABASES.mp4 3.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/13. OPENID CONNECT.mp4 3.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/10. FLOW TYPES.mp4 3.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/6. CLOUD NATIVE APPLICATIONS.mp4 3.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/2. A WORD ON CLOUD ARCHITECTURES AND FEATURES.mp4 3.2 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/1. Course Introduction and Attacking the Cloud/11. TYPES OF CLOUDS.mp4 3.2 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/9. POLICIES FOR SERVICES.mp4 2.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/6. PACU ENUMERATION MODULES.mp4 2.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/7. AZURE ACTIVE DIRECTORY ROLES.mp4 2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/5. MASSCAN TESTING THEORETICAL LIMITS.mp4 2.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/3. MAPPING AZURE URLS 2.mp4 2.7 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/12. TIPS FOR INFRASTRUCTURE MAPPING 2.mp4 2.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/5. ATTACKING CICD TOOLS.mp4 2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/2. VISUALIZATIONS DURING RECON.mp4 2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/5. SUBSET OF USEFUL STRINGS TO SEARCH FOR.mp4 2.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/4. NODEJS LAMBDA EXAMPLE.mp4 2.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/3. AWS LAMBDA.mp4 2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/3. GOBUSTER.mp4 2.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/5. Recon at Cloud Scale/6. ACME AND LETS ENCYPT.mp4 2.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/5. GOBUSTER OUTPUT.mp4 2.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/5. CEWL AND CUSTOM WORDLISTS.mp4 2.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/8. Finding Secrets and Keys within Repositories/3. GIT.mp4 2.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/4. CONTAINER ARCHITECTURES VISUALIZED LINUX.mp4 2.6 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/7. INTRIGUE IDENT.mp4 2.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/7. IPTABLES AS A REDIRECTION TOOL.mp4 2.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/13. MAPPING VISUALIZED MULTIPLE LAYERS OF ABSTRACTION.mp4 2.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/4. DOMAIN HUNTER SYNTAX.mp4 2.6 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/14. SQL INJECTION DEFENSES.mp4 2.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/10. THCHYDRA.mp4 2.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/5. NAVIGATING THE METASPLOIT FRAMEWORK.mp4 2.1 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/11. SQL VS MONGODB A PRIMER.mp4 2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/7. CERTIFICATE USAGE IN KUBERNETES.mp4 2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/11. PODS.mp4 2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/4. KUBERNETES ARCHITECTURE II.mp4 2.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/13. CHOICES FOR RESTRICTIONS.mp4 2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/3. COMMAND LINE EXECUTION EXAMPLE.mp4 2.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/11. AZURE AD RBAC ROLES.mp4 2.1 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/2. CODE EXECUTION ON WINDOWS.mp4 2.1 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/7. Command Line Injections in Applications/5. COMMAND INJECTION PRIMITIVES.mp4 2.1 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/5. BUYING GOOD WEB PROPERTIES FLIPPA.mp4 2.0 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/5. HYBRID WORKERS.mp4 2.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/18. VULNERABILITY HUNTING IN KUBERNETES.mp4 2.0 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/13. AZURE AD SCOPE.mp4 2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/12. BACKDOOR CONTAINER WORKFLOW.mp4 2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/11. THCHYDRA SYNTAX AND EXAMPLES.mp4 2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/10. BUILDING PAYLOADS.mp4 2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/2. OBFUSCATION OF C2 INFRASTRUCTURE.mp4 2.0 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/7. AZURE POLICIES RESTRICTIONS.mp4 2.0 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/12. SQLMAP AND CLOUD APPLICATIONS.mp4 2.0 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/10. IMPACT OF EXPOSING THESE INJECTIONS.mp4 2.0 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/3. AWS CROSSACCOUNT COPIES.mp4 1.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/4. HOW APPLICATIONS TALK CLASSIC.mp4 1.9 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/1. Red Team Exploitation/7. RED TEAM AND THE CLOUD.mp4 1.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/5. PACU RECON MODULES UNAUTHENTICATED.mp4 1.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/9. SQL Injection in a Hosted Environment/11. SQLMAPPY.mp4 1.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/13. WRAPPING UP SECTION 2.mp4 1.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/5. IDENTITIES WITH AZURE FILES AND ONPREMISE SERVICES.mp4 1.9 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/3. MASSCAN DEFAULT SYNTAX.mp4 1.9 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/5. TRADITIONAL PAYLOADS FOR PENETRATION TESTING FRAMEWORKs.mp4 1.9 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/5. INTRIGUE DESIGN.mp4 1.9 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/6. CONTAINERS SIMPLIFY APP DEPLOYMENTS.mp4 1.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/2. WHY FOCUS ON AUTHENTICATION STANDARDS.mp4 1.9 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/10. ATTRIBUTE BASED ACCESS CONTROL.mp4 1.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/4. MICROSOFT TRADITIONAL ACTIVE DIRECTORY.mp4 1.9 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/20. IDENTIFYING SAML.mp4 1.9 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/5. PAID EXTRAS REDISLABS.mp4 1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/2. TESTING POLICIES PUBLIC CLOUD SERVICE PROVIDERS IAAS.mp4 1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/2. INTERACTING WITH BASIC INFRASTRUCTURE CLOUD COMPONENTS.mp4 1.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/3. WEB AUTHENTICATION STANDARDS.mp4 1.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/8. WINDOWS PORTPROXY.mp4 1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/6. Domain and Host Discovery Tools/2. DOMAIN ENUMERATION TOOLS.mp4 1.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/14. EXAMPLE DEPLOYMENT YAML.mp4 1.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/8. ATTACKERS VIEW OF THE KUBERNETES.mp4 1.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/6. AWS LAMBDA SHELLS.mp4 1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/4. EYEWITNESS.mp4 1.8 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/21. EXAMPLE SAML MESSAGE.mp4 1.8 MB
VoD 2020/2. Mapping Authentication and Cloud Services/6. AWS IAM/7. IDENTITY VS RESOURCE POLICIES.mp4 1.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/2. PASSWORD ATTACK TYPES AND METHODOLOGY.mp4 1.8 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/6. A WORD ON SQL INJECTION VS NOSQL INJECTION.mp4 1.8 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/6. BEACONBASED PAYLOADS.mp4 1.8 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/8. USING TRAVIS TO MOVE LATERALLY.mp4 1.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/4. DETECTING CICD TOOLS.mp4 1.7 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/8. USERNAME STRUCTURES.mp4 1.7 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/4. MOUNTING A DICTIONARY ATTACK.mp4 1.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/5. POSTMAN AND MICROSOFT GRAPH.mp4 1.7 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/2. Cloud Assessment Methodology/6. ATTACKING SOFTWARE AS A SERVICE.mp4 1.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/6. ServerSide Request Forgeries/3. WHY ARE SSRFS POPULAR AGAIN.mp4 1.7 MB
VoD 2020/3. Azure and Windows Services in the Cloud/11. Microsoft Graph/4. MICROSOFT GRAPH PERMISSION EXAMPLE.mp4 1.7 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/10. Containers and Microservices/8. CONTAINER CROSS COMMUNICATION.mp4 1.6 MB
VoD 2020/2. Mapping Authentication and Cloud Services/7. AWS IAM Privilege Escalations/4. IAM AND USER VERSIONING 1.mp4 1.6 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/6. MOUNTING A CREDENTIAL STUFFING ATTACK.mp4 1.6 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/12. AZURE AD ADMINISTRATOR ROLES.mp4 1.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/8. MASSCAN FOLLOWED UP BY NMAP.mp4 1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/4. Backdooring Containers/13. KUBERNETES AND THE PAYLOAD.mp4 1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/8. MICROSOFT ONEDRIVE.mp4 1.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/3. Infrastructure Cloud Components/6. UNDERSTANDING CONTAINERS DOCKER HUB.mp4 1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/14. AZURE AD ROLES VIEWED.mp4 1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/3. MOUNTING A BRUTE FORCE ATTACK.mp4 1.5 MB
VoD 2020/2. Mapping Authentication and Cloud Services/1. Mapping Process/6. PROCESS REVIEW.mp4 1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/9. HEAVY SHELL EXAMPLES.mp4 1.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/12. PRIVILEGED PODS.mp4 1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/10. Mimikatz/4. MIMIKATZ MODULES.mp4 1.5 MB
USB 2020/SANS USB ISO MOUNT GUIDE.pdf 1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/6. HYBRID WORKERS WATCHERS.mp4 1.5 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/2. Cloud Native Applications/6. THE ARCHITECTURE FOR THIS SECTION.mp4 1.5 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/10. Redirections with OS Tools/3. INTRODUCTION TO SOCAT.mp4 1.5 MB
VoD 2020/3. Azure and Windows Services in the Cloud/2. Microsoft Identity Services/15. AZURE RBAC VS AZURE AD ADMINS VS CROSS PLATFORM ADMINS.mp4 1.5 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/7. Scaled Host and Port Discovery/11. MASSCAN NMAP WORKFLOW.mp4 1.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/7. Password Attacks/2. PASSWORDS.mp4 1.4 MB
VoD 2020/3. Azure and Windows Services in the Cloud/3. Web Authentications/18. BEARER AUTHENTICATIONS.mp4 1.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/8. Password Attack Types and Methodology/12. PWINSPECTOR.mp4 1.4 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/6. AZURE CROSS ACCOUNT COPIES.mp4 1.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/8. EXPOSED DATABASES WHY DOES THIS MATTER PHASE I.mp4 1.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/7. ADVANCED C2 ARCHITECTURES.mp4 1.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/7. DOMAIN FRONTING VISUALIZED.mp4 1.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/11. Kubernetes and Service Meshes/10. KUBERNETES CONTROL PLANE.mp4 1.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/12. Conclusion/2. SECTION 3 CONCLUSION.mp4 1.3 MB
VoD 2020/3. Azure and Windows Services in the Cloud/5. Azure Files and Services/2. MAPPING AZURE URLS 1.mp4 1.3 MB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/6. TRAVIS EXAMPLE.mp4 1.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/9. Obfuscating Architectures/11. PIVOTING WITH HTTP.mp4 1.3 MB
VoD 2020/1. Discovery Recon and Architecture at Scale/4. Terms of Service and Demarcation Points/3. ACCESS CLOUD SERVICE PROVIDERS AMAZON.mp4 1.3 MB
VoD 2020/5. Exploitation and Red Team in the Cloud/5. Data Pivots and Moving Data/5. EXFILTRATION BETWEEN BUCKETS.mp4 737.3 KB
USB 2020/SEC588 - Lab Setup Instructions.pdf 724.2 KB
VoD 2020/1. Discovery Recon and Architecture at Scale/10. Using Tools to Quickly Assess Environments/3. VISUALIZING THE SAME SITE.mp4 721.7 KB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/1. Course Roadmap 1 .mp4 711.4 KB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/1. Introduction to Cloud Native Applicatons/1. Vulnerabilities in Cloud Native Applications.mp4 685.8 KB
VoD 2020/1. Discovery Recon and Architecture at Scale/9. Exposed Databases and Configuration Flaws/9. EXPOSED DATABASES WHY DOES THIS MATTER PHASE II.mp4 649.9 KB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/8. Serverless Function Attacks with Lambda/7. Course Roadmap 2.mp4 634.4 KB
VoD 2020/5. Exploitation and Red Team in the Cloud/2. Payloads and Payload Selections/1. Course Roadmap 1.mp4 627.1 KB
VoD 2020/5. Exploitation and Red Team in the Cloud/3. Red Team Ops in the Cloud/1. Course Roadmap.mp4 594.9 KB
VoD 2020/4. Vulnerabilities in Cloud Native Applicatons/3. Deployment Pipelines and Attacks/1. Course Roadmap.mp4 588.8 KB
VoD 2020/2. Mapping Authentication and Cloud Services/4. URLs and URIs/1. Course Roadmap.mp4 229.4 KB
VoD 2020/3. Azure and Windows Services in the Cloud/8. Code Execution on Azure/8. Course Roadmap 2.mp4 229.0 KB
VoD 2020/3. Azure and Windows Services in the Cloud/4. Golden SAML Attacks/6. Course Roadmap 2.mp4 220.4 KB
VoD 2020/2. Mapping Authentication and Cloud Services/10. Introduction to PACU/14. COURSE RESOURCES AND CONTACT INFORMATION.mp4 220.3 KB
VoD 2020/1. Discovery Recon and Architecture at Scale/11. Asset Discovery Services and Applications/9. COURSE RESOURCES AND CONTACT INFORMATION.mp4 219.2 KB
VoD 2020/2. Mapping Authentication and Cloud Services/5. Mapping Subdomains and Routes/1. Course Roadmap 1.mp4 205.3 KB