SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.1 Architecture, Discovery and Recon at Scale hide01.ir.webm9.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.10 Generic Cloud Architectures hide01.ir.webm22.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.11 Control Plane vs Data Plane hide01.ir.webm2.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.12 Cloud Similarities and Differences hide01.ir.webm27.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.2 Table of Contents (1) hide01.ir.webm10.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.3 Table of Contents (2) hide01.ir.webm477.1 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.4 Agenda hide01.ir.webm9.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.5 Course Roadmap hide01.ir.webm382.1 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.6 Course Introduction hide01.ir.webm3.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.7 Why Cloud Penetration Testing hide01.ir.webm12.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.8 Unique Properties of Cloud Computing hide01.ir.webm11.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.9 Defining Cloud hide01.ir.webm19.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.1 Course Roadmap hide01.ir.webm449.6 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.2 Visualizations During Recon hide01.ir.webm6.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.3 Visualizing the Same Site hide01.ir.webm7.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.4 Gowitness hide01.ir.webm5.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.5 Gowitness CLI hide01.ir.webm6.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.6 Gowitness Report hide01.ir.webm897.3 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.7 External Vulnerability Scanning and Systems Identification hide01.ir.webm87.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.8 Lab 1.3 Track Your Work hide01.ir.webm2.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.1 Course Roadmap hide01.ir.webm1.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.2 Asset Discovery Frameworks hide01.ir.webm8.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.3 reNgine hide01.ir.webm8.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.4 reNgine Tools hide01.ir.webm5.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.5 Dashboard of Results hide01.ir.webm3.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.6 Scaling Discovery hide01.ir.webm44.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.7 Lab 1.4 Track Your Work hide01.ir.webm2.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.1 Course Roadmap hide01.ir.webm2.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.10 File Secrets Format hide01.ir.webm6.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.11 Subset of Useful Strings to Search For hide01.ir.webm6.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.12 .env Example hide01.ir.webm1.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.13 Where to Hunt for Keys hide01.ir.webm2.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.14 Hunting for Keys hide01.ir.webm72.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.15 Summary hide01.ir.webm6.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.16 Contacts and Resources hide01.ir.webm93.0 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.2 Authentication Type hide01.ir.webm7.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.3 Authentication Differences hide01.ir.webm12.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.4 Authentication and Key Material - AWS hide01.ir.webm13.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.5 AWS Access Keys hide01.ir.webm3.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.6 Login Endpoint - AWS hide01.ir.webm11.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.7 Authentication and Key Material - Azure hide01.ir.webm4.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.8 Azure Tools hide01.ir.webm11.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.9 Searching for Key Material hide01.ir.webm12.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.1 Course Roadmap hide01.ir.webm254.2 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.2 Scoping and Engagement Methodology hide01.ir.webm11.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.3 Cloud Penetration Testing Scenarios hide01.ir.webm16.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.4 MITRE ATTACK Matrices - Enterprise hide01.ir.webm2.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.5 MITRE ATTACK - Cloud Matrix hide01.ir.webm4.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.6 SANS Traditional Penetration Testing Methodology hide01.ir.webm9.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.7 SANS Cloud Penetration Testing Methodology hide01.ir.webm3.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.1 Course Roadmap hide01.ir.webm128.2 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.10 AWS Restrictions hide01.ir.webm3.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.11 Azure Policies hide01.ir.webm3.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.12 Azure Terms of Service - Scope hide01.ir.webm2.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.13 Azure Policies - Rules and Permissions hide01.ir.webm4.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.14 Azure Policies - Restrictions hide01.ir.webm10.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.15 Google Cloud Testing hide01.ir.webm6.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.2 Terms of Service and Demarcation Points hide01.ir.webm15.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.3 Shared Responsibility and Pen Testing hide01.ir.webm16.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.4 Types of Clouds hide01.ir.webm3.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.5 Attacking Software as a Service hide01.ir.webm6.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.6 Attacking Platform as a Service hide01.ir.webm2.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.7 The Attackers View of IaaS hide01.ir.webm3.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.8 Testing Policies of Public Cloud Service Providers hide01.ir.webm1.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.9 Access Cloud Service Providers - Amazon hide01.ir.webm4.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4..10 ACME and Lets Encrypt hide01.ir.webm6.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.1 Course Roadmap hide01.ir.webm1.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.11 Certificate Transparency for Host Discovery hide01.ir.webm3.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.12 Hosts through Certificates hide01.ir.webm1.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.13 Hostnames and CNAMEs for Technology Discovery hide01.ir.webm4.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.14 DNS Hygiene Issues - Subdomain Hijacks hide01.ir.webm9.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.15 Example Subdomain Takeover hide01.ir.webm5.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.16 Leveraging Existing Patterns hide01.ir.webm8.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.2 Discovery hide01.ir.webm11.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.3 Building an Asset Collection Pipeline hide01.ir.webm11.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.4 Asset Collection Pipeline Wire Diagram hide01.ir.webm6.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.5 How Can We Use this Data hide01.ir.webm6.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.6 Seed Values - Domains hide01.ir.webm29.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.7 Domains and Host Discovery hide01.ir.webm16.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.8 Datasources and APIs hide01.ir.webm5.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.9 Passive Technique - Certificate Transparency hide01.ir.webm11.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.1 Course Roadmap hide01.ir.webm2.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.10 Pure DNS Usage hide01.ir.webm4.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.11 OWASP Armass hide01.ir.webm8.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.2 Domain Enumeration Tools hide01.ir.webm5.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.3 Subfinder hide01.ir.webm16.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.4 Running Subfinder hide01.ir.webm4.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.5 Subfinder Configuration File hide01.ir.webm1.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.6 DNSx hide01.ir.webm8.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.7 Running DNSx hide01.ir.webm6.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.8 Intro - MassDNS hide01.ir.webm7.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.9 PureDNS hide01.ir.webm4.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.1 Course Roadmap hide01.ir.webm31.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.10 How to use ngrok hide01.ir.webm14.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.11 Target Discovery hide01.ir.webm113.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.12 Recommendations for Labs hide01.ir.webm621.4 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.2 Lab Introduction hide01.ir.webm2.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.3 Class Notes hide01.ir.webm8.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.4 How are these Items Used hide01.ir.webm12.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.5 Solutions to Connectivity Challenges hide01.ir.webm1.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.6 ngrok hide01.ir.webm8.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.7 ngrok Connectivity hide01.ir.webm3.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.8 ngrok HTTP Redirection hide01.ir.webm14.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.9 ngrok Options hide01.ir.webm12.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.1 Course Roadmap hide01.ir.webm455.5 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.10 Masscan Testing Theoretical Limit hide01.ir.webm7.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.11 Masscan TCP Connections vs NMAP hide01.ir.webm10.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.12 Masscan Workflow hide01.ir.webm11.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.13 Masscan Followed Up by Nmap hide01.ir.webm8.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.14 Nmap Tour hide01.ir.webm4.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.15 Nmap NSE hide01.ir.webm6.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.16 Masscan Nmap Workflow hide01.ir.webm1.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.17 Scancannon hide01.ir.webm3.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.18 Naabu hide01.ir.webm7.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.19 Scanning Best Practices hide01.ir.webm8.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.2 IP Addressing and Hosts hide01.ir.webm16.4 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.20 External Port Scanning hide01.ir.webm151.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.21 Lab 1.2 Track Your Work hide01.ir.webm4.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.3 Mapping to Technologies hide01.ir.webm6.6 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.4 Host Discovery Continued - IP Addresses hide01.ir.webm8.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.5 Cloud Service Provider Mappings hide01.ir.webm2.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.6 Edge hide01.ir.webm1.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.7 Port Scanning at Web Scale hide01.ir.webm7.7 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.8 Masscan Default Syntax hide01.ir.webm3.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.9 Masscan Scanning Options hide01.ir.webm11.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.1 Course Roadmap hide01.ir.webm417.4 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.2 Mapping URLs hide01.ir.webm5.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.3 Mapping Azure URLs (1) hide01.ir.webm2.5 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.4 Mapping Azure URLs (2) hide01.ir.webm2.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.5 Building Good Wordlists hide01.ir.webm2.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.6 Commonspeak2 Queries hide01.ir.webm9.3 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.7 Commonspeak2 Commands hide01.ir.webm6.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.8 Commonspeak2 Example of Subdomain Query hide01.ir.webm7.0 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.9 Wordlists.assetnote.io hide01.ir.webm5.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..1 Course Roadmap hide01.ir.webm416.8 KB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..2 Vulnerabilites in Cloud Apps hide01.ir.webm5.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..3 Nuclei hide01.ir.webm4.2 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..4 Running Nuclei hide01.ir.webm2.9 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..5 Nuclei Templates hide01.ir.webm10.1 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..6 Nuclei Advanced Usage hide01.ir.webm5.8 MB
SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..7 Nuclei Advanced Examples hide01.ir.webm5.2 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.1 Course Roadmap hide01.ir.webm391.8 KB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.10 AWS Cognito hide01.ir.webm6.6 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.11 AWS Cognito Username Harvesting hide01.ir.webm7.6 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.2 Identity is the New Perimeter hide01.ir.webm14.8 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.3 Multiple Authentication Types hide01.ir.webm7.8 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.4 Strategizing your Attack hide01.ir.webm10.6 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.5 Username Harvesting in the Cloud hide01.ir.webm2.4 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.6 IdPs Making Harvesting Easier hide01.ir.webm2.6 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.7 Okta Example hide01.ir.webm5.6 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.8 Entra ID Examples hide01.ir.webm2.5 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.9 Microsoft Authentication Endpoints hide01.ir.webm7.7 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.1 Course Roadmap hide01.ir.webm1.1 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.10 Entra Domain Services hide01.ir.webm2.5 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.2 Introduction to Microsoft Cloud Services hide01.ir.webm19.5 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.3 Comparison of Service Names between Each Provider hide01.ir.webm14.9 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.4 On Premises, Azure, and AWS Role Comparisons hide01.ir.webm11.7 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.5 Microsoft Identity Services hide01.ir.webm9.6 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.6 High-Level View of Identity in Microsoft hide01.ir.webm12.8 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.7 Microsoft Traditional Active Directory hide01.ir.webm4.3 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.8 Microsoft Active Directory Federation Services hide01.ir.webm3.1 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.9 Entra ID hide01.ir.webm3.8 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.1 Course Roadmap hide01.ir.webm482.6 KB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.10 Mounting an Attack - Setup hide01.ir.webm6.1 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.11 Register an App hide01.ir.webm1.1 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.12 O365-Attack-Toolkit hide01.ir.webm1.3 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.13 App Consent and Graph hide01.ir.webm130.8 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.2 Entra ID and Applications hide01.ir.webm15.3 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.3 Entra ID Permissions hide01.ir.webm3.1 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.4 Consent and Permissions hide01.ir.webm10.1 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.5 Microsoft Graph Introduction hide01.ir.webm9.0 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.6 Microsoft Graph Constraints hide01.ir.webm7.2 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.7 Postman and Microsoft GRAPH hide01.ir.webm1.5 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.8 Microsoft Graph Permission Example hide01.ir.webm2.0 MB
SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.9 Using the Graph API for Search hide01.ir.webm6.4 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.1 Course Roadmap hide01.ir.webm521.0 KB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.10 Summary hide01.ir.webm8.3 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.11 Contacts and Resources hide01.ir.webm92.6 KB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.2 Code Execution on Windows hide01.ir.webm5.2 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.3 Custom Script Extension hide01.ir.webm5.7 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.4 Executing Commands through Run-Command hide01.ir.webm2.1 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.5 Run-Command Caveats hide01.ir.webm3.1 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.6 Hybrid Workers hide01.ir.webm8.1 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.7 Hybrid Workers - Watchers hide01.ir.webm8.8 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.8 WinRM hide01.ir.webm7.3 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.9 Running Commands on Azure VMs hide01.ir.webm140.0 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.1 Course Roadmap hide01.ir.webm467.3 KB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.2 IAM and Privlege Escaltion Issues hide01.ir.webm5.3 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.3 Classic Priv vs Cloud Priv Esc hide01.ir.webm2.4 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.4 IAM User Versioning (1) hide01.ir.webm9.7 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.5 IAM User Versioning (2) hide01.ir.webm80.8 KB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.6 IAM User Versioning (3) hide01.ir.webm92.2 KB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.7 IAM Passrole hide01.ir.webm96.3 KB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.1 Course Roadmap hide01.ir.webm2.0 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.2 Intro to Callbacks and Shells hide01.ir.webm10.3 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.3 Introduction to Socat hide01.ir.webm4.4 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.4 SOCAT Address Format hide01.ir.webm8.6 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.5 Socat Examples hide01.ir.webm17.5 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.6 Redirections of Other Pivots hide01.ir.webm6.5 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.7 Using Port Proxies and Built-in tools hide01.ir.webm5.5 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.8 IPTABLES as a Redirection tool hide01.ir.webm9.2 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.9 Windows Portproxy hide01.ir.webm9.1 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.9 Confused Deputy/3.9.5 AssumeRole with Confused Deputy hide01.ir.webm11.5 MB
SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.9 Confused Deputy/3.9.6 Assume Role hide01.ir.webm63.3 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.1 Vulnerabilities in Cloud-Native Applications hide01.ir.webm9.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.10 How Cloud Applications Talk - Cloud Native hide01.ir.webm12.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.2 Table of Contents (1) hide01.ir.webm11.8 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.3 Table of Contents (2) hide01.ir.webm74.9 KB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.4 Course Roadmap hide01.ir.webm415.8 KB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.5 Introduction to Cloud-Native Attacks hide01.ir.webm10.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.6 Cloud-Native Applications hide01.ir.webm20.3 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.7 Cloud-Native Application Architectures hide01.ir.webm4.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.8 CNCF Trail Map hide01.ir.webm10.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.9 How Applications Talk - Classic hide01.ir.webm3.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.1 Course Roadmap hide01.ir.webm457.8 KB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.10 SQL Injection Visualized in NodeJS (4) hide01.ir.webm3.5 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.11 SQLmap.py hide01.ir.webm6.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.12 SQLmap and Cloud Applications hide01.ir.webm9.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.13 Sqlmap Examples hide01.ir.webm8.3 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.14 SQL Injection Defenses hide01.ir.webm2.1 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.15 Databases hide01.ir.webm110.1 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.16 Summary hide01.ir.webm869.1 KB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.17 Contacts and Resources hide01.ir.webm92.6 KB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.2 SQL Injection in a Hosted Enviroment hide01.ir.webm4.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.3 Amazon RDS and Aurora hide01.ir.webm1.8 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.4 RDS Design hide01.ir.webm4.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.5 SQL Injection hide01.ir.webm7.5 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.6 SQL Injection Workflow hide01.ir.webm6.5 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.7 SQL Injection Visualized in NodeJS (1) hide01.ir.webm4.5 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.8 SQL Injection Visualized in NodeJS (2) hide01.ir.webm2.8 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.9 SQL Injection Visualized in NodeJS (3) hide01.ir.webm3.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.1 Course Roadmap hide01.ir.webm1.8 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.2 Infrastructure as Code hide01.ir.webm16.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.3 Terraform hide01.ir.webm5.4 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.4 Attacking Terraform hide01.ir.webm6.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.5 Terraform State File hide01.ir.webm11.9 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.6 Terraform State Files hide01.ir.webm58.8 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.1 Course Roadmap hide01.ir.webm1.4 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.10 Travis Example hide01.ir.webm6.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.11 Travis Configuration Files hide01.ir.webm3.9 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.12 Using Travis to Move Laterally hide01.ir.webm5.3 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.13 Tips on Output hide01.ir.webm7.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.14 Several use Cases hide01.ir.webm6.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.15 Example Scripts hide01.ir.webm5.4 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.16 Abusing CI CD Pipelines hide01.ir.webm77.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.2 Development Pipeline and Attacks hide01.ir.webm7.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.3 Git hide01.ir.webm11.4 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.4 Deployment Pipelines hide01.ir.webm14.3 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.5 Gitops hide01.ir.webm7.0 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.6 Nobelium Case Study hide01.ir.webm14.5 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.7 Build Systems hide01.ir.webm9.0 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.8 Detecting CI CD Tools hide01.ir.webm7.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.9 Attacking CI CD hide01.ir.webm15.3 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.5 Web Application Injections/4.5.1 Course Roadmap hide01.ir.webm3.1 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.5 Web Application Injections/4.5.2 Web Application Injections hide01.ir.webm4.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.5 Web Application Injections/4.5.3 Injections hide01.ir.webm9.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.3 Why are SSRFs Popular again hide01.ir.webm6.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.7 Are SSRF Solved in the Cloud hide01.ir.webm7.1 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.8 SSRFs in the Wild hide01.ir.webm8.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.1 Course Roadmap hide01.ir.webm1.0 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.10 Command-Line Injection hide01.ir.webm90.8 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.2 Command-Line Execution in a Web Application hide01.ir.webm11.3 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.3 Command-Line Execution Example hide01.ir.webm1.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.4 Exploiting Command Injection hide01.ir.webm10.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.5 Command Injection Primitives hide01.ir.webm4.2 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.6 Command Injection and Cloud Native hide01.ir.webm9.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.7 Finding Command Injection hide01.ir.webm7.4 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.8 Command-Line Injection vs RCE hide01.ir.webm13.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.9 SSJI hide01.ir.webm14.1 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.1 Course Roadmap hide01.ir.webm1.4 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.10 Azure Serverless hide01.ir.webm13.1 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.11 Attackers View of Windows Functions hide01.ir.webm9.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.12 Attacking Serverless Functions hide01.ir.webm1.4 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.13 Serverless Functions hide01.ir.webm103.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.2 Serverless Function Attacks hide01.ir.webm5.4 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.3 AWS Lambda hide01.ir.webm8.1 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.4 AWS Lambda Constraints hide01.ir.webm5.0 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.5 NodeJS Lambda Example - JavaScript hide01.ir.webm6.5 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.6 Lambda Limitations hide01.ir.webm5.5 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.7 Executing Lambda Functions Manually hide01.ir.webm5.3 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.8 Exploits in Lambda Software hide01.ir.webm5.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.9 AWS Lambda Shells hide01.ir.webm5.9 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.10 Impact of Exposing these Injections hide01.ir.webm6.9 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.11 SQL vs MongoDB - A Primer hide01.ir.webm6.7 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.6 A Word on SQL Injection vs NoSQL Injection hide01.ir.webm9.6 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.7 Connecting to Cloud Databases hide01.ir.webm5.1 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.8 Exposed Databases - Why Does this Matter (1) hide01.ir.webm4.8 MB
SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.9 Exposed Databases - Why Does this Matter (2) hide01.ir.webm4.1 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.1 Infrastructure Attacks and Red Teaming hide01.ir.webm5.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.10 Data Pivoting Options hide01.ir.webm9.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.11 AWS Cross-Account Copies hide01.ir.webm4.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.12 Attacker Account IAM Permissions hide01.ir.webm1.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.13 Exfiltration between Buckets hide01.ir.webm6.3 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.14 Azure Cross-Account Copies hide01.ir.webm1.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.15 Smuggling with Enterprise Tools hide01.ir.webm1.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.16 Microsoft OneDrive hide01.ir.webm2.3 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.17 snaffpoint hide01.ir.webm6.2 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.2 Table of Contents hide01.ir.webm3.9 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.3 Course Roadmap hide01.ir.webm353.9 KB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.4 Red Team Ops in the Cloud hide01.ir.webm8.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.5 Why Discuss Red Team hide01.ir.webm2.3 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.6 Red Team and the Cloud hide01.ir.webm2.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.7 Difficulty in Blocking Cloud Service Providers hide01.ir.webm9.3 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.8 Leverage CSP Networking Options hide01.ir.webm10.1 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.9 ProxyCannon-NG hide01.ir.webm3.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.1 Course Roadmap hide01.ir.webm306.7 KB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.10 Using Valid Credentials in Metasploit hide01.ir.webm1.9 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.2 Obfuscation of C2 Infrastructure hide01.ir.webm8.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.3 Finding Valid Domain with Domain Hunter hide01.ir.webm8.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.4 Domain Hunter Syntax hide01.ir.webm4.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.5 Buying Good Web Properties - Flippa hide01.ir.webm9.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.6 Domain Fronting hide01.ir.webm10.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.7 Domain Fronting Visualized hide01.ir.webm4.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.8 Domain Fronting Methodology hide01.ir.webm11.9 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.9 Metasploit and Valid Cryptography hide01.ir.webm7.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.1 Course Roadmap hide01.ir.webm8.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.10 How to Containers work hide01.ir.webm1.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.11 Linux Containers Architecture hide01.ir.webm5.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.12 How to Run Containers Natively hide01.ir.webm9.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.2 Containers and Intrastructure (1) hide01.ir.webm238.2 KB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.3 Intro to Containers hide01.ir.webm8.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.4 Containers vs VMs - VMs hide01.ir.webm2.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.5 Containers vs VMs - Containers hide01.ir.webm1.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.6 Containers vs VMs - WASM+WASI hide01.ir.webm4.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.7 Containers vs VMs - Unikernel hide01.ir.webm6.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.8 Containers and Infrastructure (2) hide01.ir.webm6.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.9 Software Packaging hide01.ir.webm3.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.1 Course Roadmap hide01.ir.webm231.0 KB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.10Microservices and Cloud-Native Applications hide01.ir.webm675.0 KB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.11 Containers Intro hide01.ir.webm86.9 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.2 Docker Introduction hide01.ir.webm2.2 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.3 Docker Desktop Example hide01.ir.webm1.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.4 Docker CLI hide01.ir.webm4.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.5 Dockerfile hide01.ir.webm10.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.6 Docker and Overlay2 hide01.ir.webm8.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.7 Container Cross-Communication hide01.ir.webm6.3 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.8 Docker Networking hide01.ir.webm8.9 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.9 Container Networking hide01.ir.webm5.1 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.1 Course Roadmap hide01.ir.webm1.1 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.2 Docker Vulnerabilities hide01.ir.webm6.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.3 Docker Capabilities hide01.ir.webm1.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.4 Docker.sock hide01.ir.webm4.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.5 Abusing Docker.sock hide01.ir.webm1.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.6 Hardening Containers hide01.ir.webm4.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.7 Assessing Docker hide01.ir.webm149.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.1 Course Roadmao hide01.ir.webm4.1 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.10 Kubernetes Control Plane hide01.ir.webm9.2 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.11 RBAC hide01.ir.webm6.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.12 Pods hide01.ir.webm4.7 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.13 Privileged Pods hide01.ir.webm11.9 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.14 Keeping Secrets in Kubernetes hide01.ir.webm6.1 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.15 Tesla Example hide01.ir.webm5.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.16 Kubeflow Dashboard hide01.ir.webm4.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.17 Kubernetes Authorization Example hide01.ir.webm6.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.18 RBAC Example hide01.ir.webm2.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.19 Namespaces hide01.ir.webm949.0 KB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.2 Kubernetes hide01.ir.webm6.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.20 Network Attacks hide01.ir.webm2.1 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.21 Vulnerabilty Hunting in Kubernetes hide01.ir.webm7.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.22 Kubernetes and ScoutSuite hide01.ir.webm1.2 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.23 Automated Attack with Peirates hide01.ir.webm1.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.24 Peirates Options hide01.ir.webm1.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.25 Kubernetes and Peirates hide01.ir.webm109.3 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.3 Kubernetes Architecture (1) hide01.ir.webm2.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.4 Kubernetes Architecture (2) hide01.ir.webm5.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.5 Kubernetes Nodes hide01.ir.webm2.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.6 Kubernetes Architecture (3) hide01.ir.webm2.0 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.7 Tooling in Kubernetes hide01.ir.webm12.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.8 Attackers View of the Kubernetes hide01.ir.webm5.4 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.9 Types of Deployments hide01.ir.webm4.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.1 Course Roadmap hide01.ir.webm2.5 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.10 Contacts and Resources hide01.ir.webm92.6 KB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.2 Implanting Backdoor in Containers hide01.ir.webm3.3 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.3 Kubernetes and Payloads hide01.ir.webm8.2 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.4 Backdoor Container Workflow hide01.ir.webm6.6 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.5 Choosing Deployments in Kubernetes hide01.ir.webm9.7 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.6 Example Deployment .yaml hide01.ir.webm1.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.7 Backdooring Containers hide01.ir.webm144.2 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.8 What is Next hide01.ir.webm11.8 MB
SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.9 Summary hide01.ir.webm5.6 MB