Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Not Trusted

Seeders:
Leechers:
Info Hash:
56C790F69BE1869CEFABC339BF464A6161FA79CF
  1. SEC588 I01_07 2023 hide01.ir.pdf 55.4 MB
  2. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.1 Architecture, Discovery and Recon at Scale hide01.ir.webm 9.4 MB
  3. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.10 Generic Cloud Architectures hide01.ir.webm 22.9 MB
  4. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.11 Control Plane vs Data Plane hide01.ir.webm 2.1 MB
  5. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.12 Cloud Similarities and Differences hide01.ir.webm 27.0 MB
  6. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.2 Table of Contents (1) hide01.ir.webm 10.4 MB
  7. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.3 Table of Contents (2) hide01.ir.webm 477.1 KB
  8. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.4 Agenda hide01.ir.webm 9.3 MB
  9. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.5 Course Roadmap hide01.ir.webm 382.1 KB
  10. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.6 Course Introduction hide01.ir.webm 3.2 MB
  11. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.7 Why Cloud Penetration Testing hide01.ir.webm 12.8 MB
  12. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.8 Unique Properties of Cloud Computing hide01.ir.webm 11.5 MB
  13. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.1 Course Introduction/1.1.9 Defining Cloud hide01.ir.webm 19.1 MB
  14. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.1 Course Roadmap hide01.ir.webm 449.6 KB
  15. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.2 Visualizations During Recon hide01.ir.webm 6.8 MB
  16. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.3 Visualizing the Same Site hide01.ir.webm 7.7 MB
  17. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.4 Gowitness hide01.ir.webm 5.3 MB
  18. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.5 Gowitness CLI hide01.ir.webm 6.2 MB
  19. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.6 Gowitness Report hide01.ir.webm 897.3 KB
  20. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.7 External Vulnerability Scanning and Systems Identification hide01.ir.webm 87.6 MB
  21. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.10 Visualizations During Recon/1.10.8 Lab 1.3 Track Your Work hide01.ir.webm 2.9 MB
  22. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.1 Course Roadmap hide01.ir.webm 1.1 MB
  23. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.2 Asset Discovery Frameworks hide01.ir.webm 8.1 MB
  24. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.3 reNgine hide01.ir.webm 8.1 MB
  25. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.4 reNgine Tools hide01.ir.webm 5.2 MB
  26. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.5 Dashboard of Results hide01.ir.webm 3.2 MB
  27. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.6 Scaling Discovery hide01.ir.webm 44.5 MB
  28. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.11 Asset Discovery Frameworks/1.11.7 Lab 1.4 Track Your Work hide01.ir.webm 2.1 MB
  29. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.1 Course Roadmap hide01.ir.webm 2.2 MB
  30. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.10 File Secrets Format hide01.ir.webm 6.5 MB
  31. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.11 Subset of Useful Strings to Search For hide01.ir.webm 6.5 MB
  32. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.12 .env Example hide01.ir.webm 1.5 MB
  33. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.13 Where to Hunt for Keys hide01.ir.webm 2.5 MB
  34. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.14 Hunting for Keys hide01.ir.webm 72.8 MB
  35. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.15 Summary hide01.ir.webm 6.1 MB
  36. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.16 Contacts and Resources hide01.ir.webm 93.0 KB
  37. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.2 Authentication Type hide01.ir.webm 7.9 MB
  38. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.3 Authentication Differences hide01.ir.webm 12.5 MB
  39. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.4 Authentication and Key Material - AWS hide01.ir.webm 13.0 MB
  40. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.5 AWS Access Keys hide01.ir.webm 3.2 MB
  41. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.6 Login Endpoint - AWS hide01.ir.webm 11.6 MB
  42. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.7 Authentication and Key Material - Azure hide01.ir.webm 4.6 MB
  43. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.8 Azure Tools hide01.ir.webm 11.6 MB
  44. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.12 Authentications and Key Material/1.12.9 Searching for Key Material hide01.ir.webm 12.3 MB
  45. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.1 Course Roadmap hide01.ir.webm 254.2 KB
  46. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.2 Scoping and Engagement Methodology hide01.ir.webm 11.7 MB
  47. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.3 Cloud Penetration Testing Scenarios hide01.ir.webm 16.7 MB
  48. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.4 MITRE ATTACK Matrices - Enterprise hide01.ir.webm 2.0 MB
  49. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.5 MITRE ATTACK - Cloud Matrix hide01.ir.webm 4.9 MB
  50. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.6 SANS Traditional Penetration Testing Methodology hide01.ir.webm 9.0 MB
  51. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.2 The Testing Process/1.2.7 SANS Cloud Penetration Testing Methodology hide01.ir.webm 3.6 MB
  52. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.1 Course Roadmap hide01.ir.webm 128.2 KB
  53. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.10 AWS Restrictions hide01.ir.webm 3.7 MB
  54. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.11 Azure Policies hide01.ir.webm 3.3 MB
  55. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.12 Azure Terms of Service - Scope hide01.ir.webm 2.4 MB
  56. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.13 Azure Policies - Rules and Permissions hide01.ir.webm 4.8 MB
  57. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.14 Azure Policies - Restrictions hide01.ir.webm 10.5 MB
  58. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.15 Google Cloud Testing hide01.ir.webm 6.0 MB
  59. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.2 Terms of Service and Demarcation Points hide01.ir.webm 15.8 MB
  60. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.3 Shared Responsibility and Pen Testing hide01.ir.webm 16.0 MB
  61. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.4 Types of Clouds hide01.ir.webm 3.4 MB
  62. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.5 Attacking Software as a Service hide01.ir.webm 6.4 MB
  63. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.6 Attacking Platform as a Service hide01.ir.webm 2.6 MB
  64. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.7 The Attackers View of IaaS hide01.ir.webm 3.7 MB
  65. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.8 Testing Policies of Public Cloud Service Providers hide01.ir.webm 1.2 MB
  66. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.3 Testing and Limits/1.3.9 Access Cloud Service Providers - Amazon hide01.ir.webm 4.4 MB
  67. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4..10 ACME and Lets Encrypt hide01.ir.webm 6.6 MB
  68. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.1 Course Roadmap hide01.ir.webm 1.1 MB
  69. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.11 Certificate Transparency for Host Discovery hide01.ir.webm 3.9 MB
  70. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.12 Hosts through Certificates hide01.ir.webm 1.3 MB
  71. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.13 Hostnames and CNAMEs for Technology Discovery hide01.ir.webm 4.2 MB
  72. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.14 DNS Hygiene Issues - Subdomain Hijacks hide01.ir.webm 9.3 MB
  73. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.15 Example Subdomain Takeover hide01.ir.webm 5.6 MB
  74. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.16 Leveraging Existing Patterns hide01.ir.webm 8.6 MB
  75. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.2 Discovery hide01.ir.webm 11.1 MB
  76. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.3 Building an Asset Collection Pipeline hide01.ir.webm 11.8 MB
  77. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.4 Asset Collection Pipeline Wire Diagram hide01.ir.webm 6.7 MB
  78. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.5 How Can We Use this Data hide01.ir.webm 6.7 MB
  79. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.6 Seed Values - Domains hide01.ir.webm 29.2 MB
  80. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.7 Domains and Host Discovery hide01.ir.webm 16.4 MB
  81. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.8 Datasources and APIs hide01.ir.webm 5.0 MB
  82. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.4 Recon at Cloud Scale/1.4.9 Passive Technique - Certificate Transparency hide01.ir.webm 11.6 MB
  83. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.1 Course Roadmap hide01.ir.webm 2.1 MB
  84. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.10 Pure DNS Usage hide01.ir.webm 4.0 MB
  85. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.11 OWASP Armass hide01.ir.webm 8.4 MB
  86. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.2 Domain Enumeration Tools hide01.ir.webm 5.3 MB
  87. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.3 Subfinder hide01.ir.webm 16.2 MB
  88. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.4 Running Subfinder hide01.ir.webm 4.6 MB
  89. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.5 Subfinder Configuration File hide01.ir.webm 1.1 MB
  90. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.6 DNSx hide01.ir.webm 8.3 MB
  91. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.7 Running DNSx hide01.ir.webm 6.6 MB
  92. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.8 Intro - MassDNS hide01.ir.webm 7.8 MB
  93. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.5 Host Discovery Tools/1.5.9 PureDNS hide01.ir.webm 4.3 MB
  94. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.1 Course Roadmap hide01.ir.webm 31.9 MB
  95. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.10 How to use ngrok hide01.ir.webm 14.6 MB
  96. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.11 Target Discovery hide01.ir.webm 113.5 MB
  97. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.12 Recommendations for Labs hide01.ir.webm 621.4 KB
  98. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.2 Lab Introduction hide01.ir.webm 2.2 MB
  99. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.3 Class Notes hide01.ir.webm 8.8 MB
  100. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.4 How are these Items Used hide01.ir.webm 12.4 MB
  101. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.5 Solutions to Connectivity Challenges hide01.ir.webm 1.3 MB
  102. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.6 ngrok hide01.ir.webm 8.1 MB
  103. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.7 ngrok Connectivity hide01.ir.webm 3.4 MB
  104. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.8 ngrok HTTP Redirection hide01.ir.webm 14.7 MB
  105. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.6 Intro to Course Labs/1.6.9 ngrok Options hide01.ir.webm 12.4 MB
  106. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.1 Course Roadmap hide01.ir.webm 455.5 KB
  107. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.10 Masscan Testing Theoretical Limit hide01.ir.webm 7.7 MB
  108. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.11 Masscan TCP Connections vs NMAP hide01.ir.webm 10.0 MB
  109. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.12 Masscan Workflow hide01.ir.webm 11.9 MB
  110. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.13 Masscan Followed Up by Nmap hide01.ir.webm 8.5 MB
  111. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.14 Nmap Tour hide01.ir.webm 4.2 MB
  112. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.15 Nmap NSE hide01.ir.webm 6.3 MB
  113. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.16 Masscan Nmap Workflow hide01.ir.webm 1.5 MB
  114. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.17 Scancannon hide01.ir.webm 3.6 MB
  115. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.18 Naabu hide01.ir.webm 7.2 MB
  116. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.19 Scanning Best Practices hide01.ir.webm 8.8 MB
  117. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.2 IP Addressing and Hosts hide01.ir.webm 16.4 MB
  118. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.20 External Port Scanning hide01.ir.webm 151.2 MB
  119. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.21 Lab 1.2 Track Your Work hide01.ir.webm 4.2 MB
  120. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.3 Mapping to Technologies hide01.ir.webm 6.6 MB
  121. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.4 Host Discovery Continued - IP Addresses hide01.ir.webm 8.0 MB
  122. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.5 Cloud Service Provider Mappings hide01.ir.webm 2.5 MB
  123. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.6 Edge hide01.ir.webm 1.8 MB
  124. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.7 Port Scanning at Web Scale hide01.ir.webm 7.7 MB
  125. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.8 Masscan Default Syntax hide01.ir.webm 3.2 MB
  126. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.7 IP Addressing and Port Scan/1.7.9 Masscan Scanning Options hide01.ir.webm 11.0 MB
  127. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.1 Course Roadmap hide01.ir.webm 417.4 KB
  128. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.2 Mapping URLs hide01.ir.webm 5.9 MB
  129. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.3 Mapping Azure URLs (1) hide01.ir.webm 2.5 MB
  130. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.4 Mapping Azure URLs (2) hide01.ir.webm 2.3 MB
  131. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.5 Building Good Wordlists hide01.ir.webm 2.8 MB
  132. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.6 Commonspeak2 Queries hide01.ir.webm 9.3 MB
  133. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.7 Commonspeak2 Commands hide01.ir.webm 6.0 MB
  134. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.8 Commonspeak2 Example of Subdomain Query hide01.ir.webm 7.0 MB
  135. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.8 Wordlists and Default URLs/1.8.9 Wordlists.assetnote.io hide01.ir.webm 5.1 MB
  136. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..1 Course Roadmap hide01.ir.webm 416.8 KB
  137. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..2 Vulnerabilites in Cloud Apps hide01.ir.webm 5.9 MB
  138. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..3 Nuclei hide01.ir.webm 4.2 MB
  139. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..4 Running Nuclei hide01.ir.webm 2.9 MB
  140. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..5 Nuclei Templates hide01.ir.webm 10.1 MB
  141. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..6 Nuclei Advanced Usage hide01.ir.webm 5.8 MB
  142. SEC588 Videos 2023 hide01.ir/1. Architecture, Discovery, and Recon at Scale/1.9 Vulnerability Scanning/1.9..7 Nuclei Advanced Examples hide01.ir.webm 5.2 MB
  143. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.1 Attacking Identity Systems hide01.ir.webm 3.7 MB
  144. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.10 Flow Types hide01.ir.webm 7.1 MB
  145. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.11 OpenID Connect hide01.ir.webm 5.0 MB
  146. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.12 JSON Web Tokens (JWT) hide01.ir.webm 17.6 MB
  147. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.13 Attackers View of JWT hide01.ir.webm 17.0 MB
  148. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.14 Claims hide01.ir.webm 11.0 MB
  149. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.15 OpenID Connect Authorization Code Flow hide01.ir.webm 4.9 MB
  150. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.16 OpenID Connect Authorization Token Exchange hide01.ir.webm 91.0 KB
  151. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.17 APUI Authentication hide01.ir.webm 7.9 MB
  152. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.18 SAML hide01.ir.webm 5.9 MB
  153. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.19 Identifying SAML hide01.ir.webm 7.4 MB
  154. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.2 Table Of Contents (1) hide01.ir.webm 5.8 MB
  155. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.20 Example SAML Message hide01.ir.webm 1.8 MB
  156. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.21 Attackers View of SAML hide01.ir.webm 5.1 MB
  157. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.22 SAML Workflows hide01.ir.webm 5.9 MB
  158. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.23 Web Authentication (WebAuthN) hide01.ir.webm 9.8 MB
  159. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.24 Passkeys hide01.ir.webm 4.7 MB
  160. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.3 Table of Contents (2) hide01.ir.webm 415.2 KB
  161. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.4 Course Roadmap hide01.ir.webm 1.0 MB
  162. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.5 Why Focus on Authentication Standards hide01.ir.webm 9.9 MB
  163. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.6 Web Authentication Standards hide01.ir.webm 7.8 MB
  164. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.7 Why Oauth hide01.ir.webm 16.4 MB
  165. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.8 Oauth 2.0 Terminology (1) hide01.ir.webm 6.9 MB
  166. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.1 Authentication Standards/2.1.9 Oauth 2.0 Terminology (2) hide01.ir.webm 4.6 MB
  167. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10..2 Why learn the CLI Tools hide01.ir.webm 10.1 MB
  168. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10.1 Course Roadmap hide01.ir.webm 4.4 MB
  169. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10.3 AWS CLI hide01.ir.webm 8.9 MB
  170. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10.4 AWS Authentication hide01.ir.webm 10.9 MB
  171. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10.5 AWS CLI Options hide01.ir.webm 12.3 MB
  172. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10.6 Working with AWS Services hide01.ir.webm 8.5 MB
  173. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10.7 Handling Output hide01.ir.webm 4.0 MB
  174. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10.8 Azure CLI hide01.ir.webm 3.3 MB
  175. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.10 CLI Tools/2.10.9 Azure Login Options hide01.ir.webm 12.1 MB
  176. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.11 Filtering Output/2.11.1 Course Roadmap hide01.ir.webm 1.1 MB
  177. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.11 Filtering Output/2.11.2 JMESPath Queries hide01.ir.webm 12.8 MB
  178. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.11 Filtering Output/2.11.3 Parsing JSON Output in CLI hide01.ir.webm 6.3 MB
  179. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.11 Filtering Output/2.11.4 Combining AWS and JQ hide01.ir.webm 2.1 MB
  180. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.11 Filtering Output/2.11.5 CLI Tools hide01.ir.webm 120.4 MB
  181. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.11 Filtering Output/2.11.6 Summary hide01.ir.webm 1.3 MB
  182. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.11 Filtering Output/2.11.7 Contacts and Resources hide01.ir.webm 93.2 KB
  183. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.1 Course Roadmap hide01.ir.webm 391.8 KB
  184. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.10 AWS Cognito hide01.ir.webm 6.6 MB
  185. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.11 AWS Cognito Username Harvesting hide01.ir.webm 7.6 MB
  186. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.2 Identity is the New Perimeter hide01.ir.webm 14.8 MB
  187. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.3 Multiple Authentication Types hide01.ir.webm 7.8 MB
  188. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.4 Strategizing your Attack hide01.ir.webm 10.6 MB
  189. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.5 Username Harvesting in the Cloud hide01.ir.webm 2.4 MB
  190. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.6 IdPs Making Harvesting Easier hide01.ir.webm 2.6 MB
  191. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.7 Okta Example hide01.ir.webm 5.6 MB
  192. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.8 Entra ID Examples hide01.ir.webm 2.5 MB
  193. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.2 Username Harvesting in the Cloud/2.2.9 Microsoft Authentication Endpoints hide01.ir.webm 7.7 MB
  194. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.1 Course Roadmap hide01.ir.webm 1.3 MB
  195. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.2 Username Structures hide01.ir.webm 7.3 MB
  196. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.3 Account Attack Methodology hide01.ir.webm 16.3 MB
  197. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.4 Tools hide01.ir.webm 11.2 MB
  198. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.5 CeWL and Custom Wordlists hide01.ir.webm 3.0 MB
  199. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.6 ADD-Internals hide01.ir.webm 2.1 MB
  200. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.7 TeamFiltration hide01.ir.webm 4.7 MB
  201. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.8 TeamFiltration Enumeration hide01.ir.webm 9.6 MB
  202. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.3 Username Harvesting Tools/2.3.9 Finding Valid Users hide01.ir.webm 86.8 MB
  203. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.1 Course Roadmap hide01.ir.webm 4.0 MB
  204. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.10 Password Attack Tools hide01.ir.webm 2.8 MB
  205. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.11 Smart Lockout and Shunning hide01.ir.webm 1.9 MB
  206. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.12 Amazon API Gateway hide01.ir.webm 9.7 MB
  207. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.13 Fireprox hide01.ir.webm 6.9 MB
  208. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.14 Running Fireprox hide01.ir.webm 4.9 MB
  209. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.15 Teamfiltration Password Spray hide01.ir.webm 10.4 MB
  210. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.16 Password Attacks hide01.ir.webm 128.0 MB
  211. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.2 Passwords hide01.ir.webm 14.0 MB
  212. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.3 Multiple Attack Methods for Passwords hide01.ir.webm 2.8 MB
  213. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.4 Password Lists and Wordlists hide01.ir.webm 16.3 MB
  214. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.5 Password Attack Types and Methodology hide01.ir.webm 8.5 MB
  215. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.6 Mounting a Brute Force Attack hide01.ir.webm 28.3 MB
  216. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.7 Mounting a Password Spraying attack hide01.ir.webm 9.1 MB
  217. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.8 Mounting a Credential Stuffing Attack hide01.ir.webm 12.1 MB
  218. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.4 Passwords/2.4.9 Tips for Different Types of Attacks hide01.ir.webm 29.4 MB
  219. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.1 Course Roadmap hide01.ir.webm 444.6 KB
  220. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.10 IAM Policy Example hide01.ir.webm 1.7 MB
  221. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.11 AWS IAM Visualized hide01.ir.webm 3.5 MB
  222. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.12 Identity vs Resource Policies hide01.ir.webm 5.0 MB
  223. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.13 Policy Boundaries hide01.ir.webm 3.8 MB
  224. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.14 Policies for Services hide01.ir.webm 13.0 MB
  225. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.15 Attribute-Based access Control hide01.ir.webm 9.5 MB
  226. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.16 AssumeRole hide01.ir.webm 5.5 MB
  227. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.2 AWS Terminology and IAM hide01.ir.webm 10.7 MB
  228. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.3 Amazon ARN hide01.ir.webm 6.2 MB
  229. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.4 How Cloud Resources are Referenced hide01.ir.webm 4.6 MB
  230. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.5 Amazon IAM hide01.ir.webm 16.1 MB
  231. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.6 Amazon AWS Root User hide01.ir.webm 20.0 MB
  232. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.7 IAM Defaults hide01.ir.webm 1.9 MB
  233. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.8 Identity Types on AWS hide01.ir.webm 4.2 MB
  234. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.5 AWS IAM/2.5.9 AWS Policy Evaluation Logic hide01.ir.webm 3.3 MB
  235. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.1 Course Roadmap hide01.ir.webm 1.1 MB
  236. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.10 Entra Domain Services hide01.ir.webm 2.5 MB
  237. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.2 Introduction to Microsoft Cloud Services hide01.ir.webm 19.5 MB
  238. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.3 Comparison of Service Names between Each Provider hide01.ir.webm 14.9 MB
  239. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.4 On Premises, Azure, and AWS Role Comparisons hide01.ir.webm 11.7 MB
  240. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.5 Microsoft Identity Services hide01.ir.webm 9.6 MB
  241. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.6 High-Level View of Identity in Microsoft hide01.ir.webm 12.8 MB
  242. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.7 Microsoft Traditional Active Directory hide01.ir.webm 4.3 MB
  243. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.8 Microsoft Active Directory Federation Services hide01.ir.webm 3.1 MB
  244. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.6 Introduction to Microsoft Cloud Services/2.6.9 Entra ID hide01.ir.webm 3.8 MB
  245. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.1 Course Roadmap hide01.ir.webm 537.0 KB
  246. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.10 Azure Scopes and Entra ID hide01.ir.webm 4.6 MB
  247. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.11 Entra ID Administrator Roles hide01.ir.webm 6.8 MB
  248. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.12 Entra ID Scope and Inheritance hide01.ir.webm 3.4 MB
  249. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.13 Entra ID Roles Viewed hide01.ir.webm 4.8 MB
  250. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.14 Azure RBAC vs Entra ID Admins vs Cross Platform Admins hide01.ir.webm 1.8 MB
  251. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.15 Entra ID Privilege Escalation hide01.ir.webm 4.8 MB
  252. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.2 The Hackers Guide to Entra ID hide01.ir.webm 2.0 MB
  253. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.3 Hybrid Options hide01.ir.webm 7.5 MB
  254. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.4 Different Types of Hybrid Authentications hide01.ir.webm 1.3 MB
  255. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.5 Hybrid Caveats hide01.ir.webm 7.0 MB
  256. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.6 Entra ID Roles hide01.ir.webm 5.5 MB
  257. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.7 Entra Domain Services hide01.ir.webm 5.8 MB
  258. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.8 Attackers View of Identity Services in Azure hide01.ir.webm 14.2 MB
  259. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.7 Entra ID/2.7.9 Azure RBAC Roles hide01.ir.webm 10.0 MB
  260. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.1 Course Roadmap hide01.ir.webm 482.6 KB
  261. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.10 Mounting an Attack - Setup hide01.ir.webm 6.1 MB
  262. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.11 Register an App hide01.ir.webm 1.1 MB
  263. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.12 O365-Attack-Toolkit hide01.ir.webm 1.3 MB
  264. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.13 App Consent and Graph hide01.ir.webm 130.8 MB
  265. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.2 Entra ID and Applications hide01.ir.webm 15.3 MB
  266. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.3 Entra ID Permissions hide01.ir.webm 3.1 MB
  267. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.4 Consent and Permissions hide01.ir.webm 10.1 MB
  268. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.5 Microsoft Graph Introduction hide01.ir.webm 9.0 MB
  269. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.6 Microsoft Graph Constraints hide01.ir.webm 7.2 MB
  270. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.7 Postman and Microsoft GRAPH hide01.ir.webm 1.5 MB
  271. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.8 Microsoft Graph Permission Example hide01.ir.webm 2.0 MB
  272. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.8 App Consent and Microsoft Graph/2.8.9 Using the Graph API for Search hide01.ir.webm 6.4 MB
  273. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.1 Course Roadmap hide01.ir.webm 1.9 MB
  274. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.10 Azure Files and Azure Blobs hide01.ir.webm 2.5 MB
  275. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.11 Tools to Enumerate Azure Blobs hide01.ir.webm 2.7 MB
  276. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.12 Hunting for Open File Shares hide01.ir.webm 75.2 MB
  277. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.2 File Storage Enviroments in the Cloud hide01.ir.webm 1.8 MB
  278. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.3 Authenticated Access vs Authorized Access hide01.ir.webm 2.5 MB
  279. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.4 Common Resource Policy Issues hide01.ir.webm 10.4 MB
  280. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.5 Scenario - Public Access hide01.ir.webm 5.1 MB
  281. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.6 Scenario - Authenticated Access hide01.ir.webm 8.2 MB
  282. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.7 Scenario - Authorized Access hide01.ir.webm 5.1 MB
  283. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.8 Looking for Unauthenticated File Shares hide01.ir.webm 3.4 MB
  284. SEC588 Videos 2023 hide01.ir/2. Attacking Identity Systems/2.9 Open File Shares/2.9.9 AWS S3 Bucket Hunting hide01.ir.webm 3.0 MB
  285. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.1 Attacking and Abusing Cloud Services hide01.ir.webm 3.0 MB
  286. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.10 Running CloudFox hide01.ir.webm 5.9 MB
  287. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.11 CloudFox Output hide01.ir.webm 4.8 MB
  288. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.12 CloudFox Loot hide01.ir.webm 3.2 MB
  289. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.13 Internal Cloud Enumeration hide01.ir.webm 84.0 MB
  290. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.2 Table of Contents (1) hide01.ir.webm 8.6 MB
  291. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.3 Table of Contents (2) hide01.ir.webm 1.8 MB
  292. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.4 Course Roadmap hide01.ir.webm 442.9 KB
  293. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.5 Internal Enumeration hide01.ir.webm 8.5 MB
  294. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.6 ScoutSuite hide01.ir.webm 1.2 MB
  295. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.7 Running ScoutSuite hide01.ir.webm 3.4 MB
  296. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.8 ScoutSuite Reports hide01.ir.webm 1.4 MB
  297. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.1 Internal Enumeration Tools/3.1.9 CloudFox hide01.ir.webm 4.6 MB
  298. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.10 Azure VMs/3.10.1 Course Roadmap hide01.ir.webm 462.0 KB
  299. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.10 Azure VMs/3.10.2 Azure Compute hide01.ir.webm 2.4 MB
  300. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.10 Azure VMs/3.10.3 Azure Virtual Machines - Backdooring Systems hide01.ir.webm 19.9 MB
  301. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.10 Azure VMs/3.10.4 Another Compute Attack Scenario hide01.ir.webm 3.3 MB
  302. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.10 Azure VMs/3.10.5 Working with Disks in Azure hide01.ir.webm 5.9 MB
  303. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.10 Azure VMs/3.10.6 Azure Storage Explorer hide01.ir.webm 3.1 MB
  304. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.10 Azure VMs/3.10.7 Azure VMs hide01.ir.webm 114.9 MB
  305. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.1 Course Roadmap hide01.ir.webm 521.0 KB
  306. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.10 Summary hide01.ir.webm 8.3 MB
  307. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.11 Contacts and Resources hide01.ir.webm 92.6 KB
  308. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.2 Code Execution on Windows hide01.ir.webm 5.2 MB
  309. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.3 Custom Script Extension hide01.ir.webm 5.7 MB
  310. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.4 Executing Commands through Run-Command hide01.ir.webm 2.1 MB
  311. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.5 Run-Command Caveats hide01.ir.webm 3.1 MB
  312. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.6 Hybrid Workers hide01.ir.webm 8.1 MB
  313. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.7 Hybrid Workers - Watchers hide01.ir.webm 8.8 MB
  314. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.8 WinRM hide01.ir.webm 7.3 MB
  315. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.11 Code Execution on Azure/3.11.9 Running Commands on Azure VMs hide01.ir.webm 140.0 MB
  316. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.1 Course Roadmap hide01.ir.webm 467.3 KB
  317. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.2 IAM and Privlege Escaltion Issues hide01.ir.webm 5.3 MB
  318. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.3 Classic Priv vs Cloud Priv Esc hide01.ir.webm 2.4 MB
  319. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.4 IAM User Versioning (1) hide01.ir.webm 9.7 MB
  320. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.5 IAM User Versioning (2) hide01.ir.webm 80.8 KB
  321. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.6 IAM User Versioning (3) hide01.ir.webm 92.2 KB
  322. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.2 IAM and Privilege Escalation/3.2.7 IAM Passrole hide01.ir.webm 96.3 KB
  323. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.3 AWS Compute/3.3.1 Course Roadmap hide01.ir.webm 1.0 MB
  324. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.3 AWS Compute/3.3.2 AWS Compute hide01.ir.webm 15.3 MB
  325. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.3 AWS Compute/3.3.3 EC2 Properties hide01.ir.webm 14.0 MB
  326. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.3 AWS Compute/3.3.4 AWS Instance Metadata Service hide01.ir.webm 14.0 MB
  327. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.3 AWS Compute/3.3.5 AWS Session Tokens hide01.ir.webm 4.9 MB
  328. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.3 AWS Compute/3.3.6 AWS Metadata Session Tokens v2 hide01.ir.webm 10.5 MB
  329. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.3 AWS Compute/3.3.7 Attacker Paths Utlizing EC2 hide01.ir.webm 9.5 MB
  330. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.4 Compute Attack Scenarios/3.4.1 Course Roadmap hide01.ir.webm 1.2 MB
  331. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.4 Compute Attack Scenarios/3.4.2 Compute Attack Scenarios hide01.ir.webm 17.5 MB
  332. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.4 Compute Attack Scenarios/3.4.3 Routing through Compute hide01.ir.webm 103.5 KB
  333. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.4 Compute Attack Scenarios/3.4.4 EC2 Callback hide01.ir.webm 100.4 KB
  334. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.4 Compute Attack Scenarios/3.4.5 Lambda as a Vesctor hide01.ir.webm 87.8 KB
  335. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.4 Compute Attack Scenarios/3.4.6 EC2 Userdata hide01.ir.webm 12.5 MB
  336. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.4 Compute Attack Scenarios/3.4.7 EC2 Userdata Workflow hide01.ir.webm 6.4 MB
  337. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.4 Compute Attack Scenarios/3.4.8 EC2 Attack Setup hide01.ir.webm 80.7 MB
  338. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.1 Course Roadmap hide01.ir.webm 744.0 KB
  339. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.2 Intorduction to Pacu hide01.ir.webm 4.1 MB
  340. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.3 Pacu Interface hide01.ir.webm 3.8 MB
  341. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.4 Pacu Module Dependancy and Permission Dependancy hide01.ir.webm 4.7 MB
  342. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.5 Pacu Recon Modules - Unauthenticated hide01.ir.webm 6.5 MB
  343. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.6 Pacu Enumeration Modules hide01.ir.webm 5.6 MB
  344. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.7 Pacu Escalate and Lateral Move hide01.ir.webm 6.8 MB
  345. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.8 Pacu Exploits hide01.ir.webm 8.3 MB
  346. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.5 Pacu/3.5.9 Pacu Evasions hide01.ir.webm 2.2 MB
  347. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.1 Course Roadmap hide01.ir.webm 2.0 MB
  348. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.2 Intro to Callbacks and Shells hide01.ir.webm 10.3 MB
  349. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.3 Introduction to Socat hide01.ir.webm 4.4 MB
  350. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.4 SOCAT Address Format hide01.ir.webm 8.6 MB
  351. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.5 Socat Examples hide01.ir.webm 17.5 MB
  352. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.6 Redirections of Other Pivots hide01.ir.webm 6.5 MB
  353. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.7 Using Port Proxies and Built-in tools hide01.ir.webm 5.5 MB
  354. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.8 IPTABLES as a Redirection tool hide01.ir.webm 9.2 MB
  355. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.6 Socat and Shells/3.6.9 Windows Portproxy hide01.ir.webm 9.1 MB
  356. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.7 Silver/3.7.1 Course Roadmap hide01.ir.webm 3.6 MB
  357. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.7 Silver/3.7.2 Silver hide01.ir.webm 4.8 MB
  358. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.7 Silver/3.7.3 Implant Creation hide01.ir.webm 3.9 MB
  359. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.7 Silver/3.7.4 Interacting with Implants hide01.ir.webm 3.9 MB
  360. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.7 Silver/3.7.5 Silver Post-Exploitation hide01.ir.webm 8.3 MB
  361. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.7 Silver/3.7.6 Using SOCKS in Operations hide01.ir.webm 9.8 MB
  362. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.7 Silver/3.7.7 ProxyChains hide01.ir.webm 7.0 MB
  363. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.8 AWS KMS/3.8.1 Course Roadmap hide01.ir.webm 1.2 MB
  364. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.8 AWS KMS/3.8.2 Amazon KMS hide01.ir.webm 7.4 MB
  365. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.8 AWS KMS/3.8.3 Amazon KMS Use Cases hide01.ir.webm 4.8 MB
  366. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.8 AWS KMS/3.8.4 KMS Encrypt Decrypt Behavior hide01.ir.webm 8.4 MB
  367. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.8 AWS KMS/3.8.5 End-to-End AWS Scenario hide01.ir.webm 178.8 MB
  368. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.9 Confused Deputy/3.9.1 Course Roadmap hide01.ir.webm 466.2 KB
  369. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.9 Confused Deputy/3.9.2 AWS Confused Deputy hide01.ir.webm 5.4 MB
  370. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.9 Confused Deputy/3.9.3 How to Confuse the Deputy hide01.ir.webm 7.7 MB
  371. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.9 Confused Deputy/3.9.4 AssumeRole hide01.ir.webm 6.1 MB
  372. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.9 Confused Deputy/3.9.5 AssumeRole with Confused Deputy hide01.ir.webm 11.5 MB
  373. SEC588 Videos 2023 hide01.ir/3. Attacking and Abusing Cloud Services/3.9 Confused Deputy/3.9.6 Assume Role hide01.ir.webm 63.3 MB
  374. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.1 Vulnerabilities in Cloud-Native Applications hide01.ir.webm 9.2 MB
  375. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.10 How Cloud Applications Talk - Cloud Native hide01.ir.webm 12.6 MB
  376. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.2 Table of Contents (1) hide01.ir.webm 11.8 MB
  377. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.3 Table of Contents (2) hide01.ir.webm 74.9 KB
  378. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.4 Course Roadmap hide01.ir.webm 415.8 KB
  379. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.5 Introduction to Cloud-Native Attacks hide01.ir.webm 10.7 MB
  380. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.6 Cloud-Native Applications hide01.ir.webm 20.3 MB
  381. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.7 Cloud-Native Application Architectures hide01.ir.webm 4.2 MB
  382. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.8 CNCF Trail Map hide01.ir.webm 10.6 MB
  383. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.1 Introduction to Cloud Native Attacks/4.1.9 How Applications Talk - Classic hide01.ir.webm 3.2 MB
  384. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.1 Course Roadmap hide01.ir.webm 457.8 KB
  385. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.10 SQL Injection Visualized in NodeJS (4) hide01.ir.webm 3.5 MB
  386. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.11 SQLmap.py hide01.ir.webm 6.7 MB
  387. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.12 SQLmap and Cloud Applications hide01.ir.webm 9.7 MB
  388. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.13 Sqlmap Examples hide01.ir.webm 8.3 MB
  389. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.14 SQL Injection Defenses hide01.ir.webm 2.1 MB
  390. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.15 Databases hide01.ir.webm 110.1 MB
  391. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.16 Summary hide01.ir.webm 869.1 KB
  392. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.17 Contacts and Resources hide01.ir.webm 92.6 KB
  393. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.2 SQL Injection in a Hosted Enviroment hide01.ir.webm 4.2 MB
  394. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.3 Amazon RDS and Aurora hide01.ir.webm 1.8 MB
  395. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.4 RDS Design hide01.ir.webm 4.6 MB
  396. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.5 SQL Injection hide01.ir.webm 7.5 MB
  397. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.6 SQL Injection Workflow hide01.ir.webm 6.5 MB
  398. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.7 SQL Injection Visualized in NodeJS (1) hide01.ir.webm 4.5 MB
  399. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.8 SQL Injection Visualized in NodeJS (2) hide01.ir.webm 2.8 MB
  400. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.10 SQL Injections in a Hosted Enviroment/4.10.9 SQL Injection Visualized in NodeJS (3) hide01.ir.webm 3.6 MB
  401. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.2 Mapping Applications/4.2.1 Course Roadmap hide01.ir.webm 3.3 MB
  402. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.2 Mapping Applications/4.2.2 Mapping Visualized hide01.ir.webm 12.3 MB
  403. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.2 Mapping Applications/4.2.3 Application Mapping vs Infrastructure Mapping hide01.ir.webm 29.9 MB
  404. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.2 Mapping Applications/4.2.4 HTTP Request Review - HTML hide01.ir.webm 15.8 MB
  405. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.2 Mapping Applications/4.2.5 HTTP Request Review - JSON hide01.ir.webm 5.2 MB
  406. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.2 Mapping Applications/4.2.6 Client-Side Mappings hide01.ir.webm 11.3 MB
  407. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.1 Course Roadmap hide01.ir.webm 1.8 MB
  408. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.2 Infrastructure as Code hide01.ir.webm 16.6 MB
  409. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.3 Terraform hide01.ir.webm 5.4 MB
  410. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.4 Attacking Terraform hide01.ir.webm 6.7 MB
  411. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.5 Terraform State File hide01.ir.webm 11.9 MB
  412. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.3 Infrastructure as Code/4.3.6 Terraform State Files hide01.ir.webm 58.8 MB
  413. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.1 Course Roadmap hide01.ir.webm 1.4 MB
  414. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.10 Travis Example hide01.ir.webm 6.2 MB
  415. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.11 Travis Configuration Files hide01.ir.webm 3.9 MB
  416. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.12 Using Travis to Move Laterally hide01.ir.webm 5.3 MB
  417. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.13 Tips on Output hide01.ir.webm 7.2 MB
  418. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.14 Several use Cases hide01.ir.webm 6.2 MB
  419. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.15 Example Scripts hide01.ir.webm 5.4 MB
  420. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.16 Abusing CI CD Pipelines hide01.ir.webm 77.7 MB
  421. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.2 Development Pipeline and Attacks hide01.ir.webm 7.2 MB
  422. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.3 Git hide01.ir.webm 11.4 MB
  423. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.4 Deployment Pipelines hide01.ir.webm 14.3 MB
  424. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.5 Gitops hide01.ir.webm 7.0 MB
  425. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.6 Nobelium Case Study hide01.ir.webm 14.5 MB
  426. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.7 Build Systems hide01.ir.webm 9.0 MB
  427. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.8 Detecting CI CD Tools hide01.ir.webm 7.2 MB
  428. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/4.4.9 Attacking CI CD hide01.ir.webm 15.3 MB
  429. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.5 Web Application Injections/4.5.1 Course Roadmap hide01.ir.webm 3.1 MB
  430. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.5 Web Application Injections/4.5.2 Web Application Injections hide01.ir.webm 4.6 MB
  431. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.5 Web Application Injections/4.5.3 Injections hide01.ir.webm 9.6 MB
  432. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.1 Course Roadmap hide01.ir.webm 1014.0 KB
  433. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.2 Server-Side Request Forgery (SSRF) hide01.ir.webm 14.9 MB
  434. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.3 Why are SSRFs Popular again hide01.ir.webm 6.7 MB
  435. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.4 SSRF Discovery hide01.ir.webm 10.7 MB
  436. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.5 SSRF Implications hide01.ir.webm 3.8 MB
  437. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.6 Metadata v2 token Protections hide01.ir.webm 6.4 MB
  438. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.7 Are SSRF Solved in the Cloud hide01.ir.webm 7.1 MB
  439. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.8 SSRFs in the Wild hide01.ir.webm 8.7 MB
  440. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.6 Server-Side Request Forgeries/4.6.9 SSRF Attack Lab hide01.ir.webm 73.5 MB
  441. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.1 Course Roadmap hide01.ir.webm 1.0 MB
  442. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.10 Command-Line Injection hide01.ir.webm 90.8 MB
  443. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.2 Command-Line Execution in a Web Application hide01.ir.webm 11.3 MB
  444. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.3 Command-Line Execution Example hide01.ir.webm 1.7 MB
  445. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.4 Exploiting Command Injection hide01.ir.webm 10.6 MB
  446. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.5 Command Injection Primitives hide01.ir.webm 4.2 MB
  447. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.6 Command Injection and Cloud Native hide01.ir.webm 9.6 MB
  448. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.7 Finding Command Injection hide01.ir.webm 7.4 MB
  449. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.8 Command-Line Injection vs RCE hide01.ir.webm 13.7 MB
  450. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.7 Command-Line Injections in Applications/4.7.9 SSJI hide01.ir.webm 14.1 MB
  451. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.1 Course Roadmap hide01.ir.webm 1.4 MB
  452. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.10 Azure Serverless hide01.ir.webm 13.1 MB
  453. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.11 Attackers View of Windows Functions hide01.ir.webm 9.6 MB
  454. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.12 Attacking Serverless Functions hide01.ir.webm 1.4 MB
  455. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.13 Serverless Functions hide01.ir.webm 103.7 MB
  456. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.2 Serverless Function Attacks hide01.ir.webm 5.4 MB
  457. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.3 AWS Lambda hide01.ir.webm 8.1 MB
  458. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.4 AWS Lambda Constraints hide01.ir.webm 5.0 MB
  459. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.5 NodeJS Lambda Example - JavaScript hide01.ir.webm 6.5 MB
  460. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.6 Lambda Limitations hide01.ir.webm 5.5 MB
  461. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.7 Executing Lambda Functions Manually hide01.ir.webm 5.3 MB
  462. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.8 Exploits in Lambda Software hide01.ir.webm 5.7 MB
  463. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/4.8.9 AWS Lambda Shells hide01.ir.webm 5.9 MB
  464. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.1 Course Roadmap hide01.ir.webm 417.9 KB
  465. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.10 Impact of Exposing these Injections hide01.ir.webm 6.9 MB
  466. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.11 SQL vs MongoDB - A Primer hide01.ir.webm 6.7 MB
  467. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.12 MongoDB Command Cheat Sheet hide01.ir.webm 6.5 MB
  468. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.2 Exposed Databases hide01.ir.webm 6.0 MB
  469. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.3 Discovering Exposed Services hide01.ir.webm 2.3 MB
  470. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.4 Databases in the Cloud hide01.ir.webm 6.8 MB
  471. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.5 Paid Extras - Redis Labs hide01.ir.webm 5.1 MB
  472. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.6 A Word on SQL Injection vs NoSQL Injection hide01.ir.webm 9.6 MB
  473. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.7 Connecting to Cloud Databases hide01.ir.webm 5.1 MB
  474. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.8 Exposed Databases - Why Does this Matter (1) hide01.ir.webm 4.8 MB
  475. SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.9 Exposed Databases/4.9.9 Exposed Databases - Why Does this Matter (2) hide01.ir.webm 4.1 MB
  476. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.1 Infrastructure Attacks and Red Teaming hide01.ir.webm 5.5 MB
  477. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.10 Data Pivoting Options hide01.ir.webm 9.6 MB
  478. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.11 AWS Cross-Account Copies hide01.ir.webm 4.5 MB
  479. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.12 Attacker Account IAM Permissions hide01.ir.webm 1.5 MB
  480. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.13 Exfiltration between Buckets hide01.ir.webm 6.3 MB
  481. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.14 Azure Cross-Account Copies hide01.ir.webm 1.8 MB
  482. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.15 Smuggling with Enterprise Tools hide01.ir.webm 1.4 MB
  483. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.16 Microsoft OneDrive hide01.ir.webm 2.3 MB
  484. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.17 snaffpoint hide01.ir.webm 6.2 MB
  485. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.2 Table of Contents hide01.ir.webm 3.9 MB
  486. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.3 Course Roadmap hide01.ir.webm 353.9 KB
  487. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.4 Red Team Ops in the Cloud hide01.ir.webm 8.0 MB
  488. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.5 Why Discuss Red Team hide01.ir.webm 2.3 MB
  489. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.6 Red Team and the Cloud hide01.ir.webm 2.4 MB
  490. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.7 Difficulty in Blocking Cloud Service Providers hide01.ir.webm 9.3 MB
  491. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.8 Leverage CSP Networking Options hide01.ir.webm 10.1 MB
  492. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.1 Red Team Ops in the CLoud/5.1.9 ProxyCannon-NG hide01.ir.webm 3.4 MB
  493. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.1 Course Roadmap hide01.ir.webm 306.7 KB
  494. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.10 Using Valid Credentials in Metasploit hide01.ir.webm 1.9 MB
  495. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.2 Obfuscation of C2 Infrastructure hide01.ir.webm 8.6 MB
  496. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.3 Finding Valid Domain with Domain Hunter hide01.ir.webm 8.4 MB
  497. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.4 Domain Hunter Syntax hide01.ir.webm 4.5 MB
  498. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.5 Buying Good Web Properties - Flippa hide01.ir.webm 9.4 MB
  499. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.6 Domain Fronting hide01.ir.webm 10.4 MB
  500. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.7 Domain Fronting Visualized hide01.ir.webm 4.8 MB
  501. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.8 Domain Fronting Methodology hide01.ir.webm 11.9 MB
  502. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.2 Obfuscation in the Cloud/5.2.9 Metasploit and Valid Cryptography hide01.ir.webm 7.6 MB
  503. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.1 Course Roadmap hide01.ir.webm 8.8 MB
  504. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.10 How to Containers work hide01.ir.webm 1.8 MB
  505. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.11 Linux Containers Architecture hide01.ir.webm 5.0 MB
  506. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.12 How to Run Containers Natively hide01.ir.webm 9.0 MB
  507. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.2 Containers and Intrastructure (1) hide01.ir.webm 238.2 KB
  508. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.3 Intro to Containers hide01.ir.webm 8.4 MB
  509. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.4 Containers vs VMs - VMs hide01.ir.webm 2.0 MB
  510. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.5 Containers vs VMs - Containers hide01.ir.webm 1.6 MB
  511. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.6 Containers vs VMs - WASM+WASI hide01.ir.webm 4.8 MB
  512. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.7 Containers vs VMs - Unikernel hide01.ir.webm 6.5 MB
  513. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.8 Containers and Infrastructure (2) hide01.ir.webm 6.0 MB
  514. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.3 Intro to Containers/5.3.9 Software Packaging hide01.ir.webm 3.5 MB
  515. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.1 Course Roadmap hide01.ir.webm 231.0 KB
  516. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.10Microservices and Cloud-Native Applications hide01.ir.webm 675.0 KB
  517. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.11 Containers Intro hide01.ir.webm 86.9 MB
  518. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.2 Docker Introduction hide01.ir.webm 2.2 MB
  519. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.3 Docker Desktop Example hide01.ir.webm 1.0 MB
  520. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.4 Docker CLI hide01.ir.webm 4.6 MB
  521. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.5 Dockerfile hide01.ir.webm 10.0 MB
  522. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.6 Docker and Overlay2 hide01.ir.webm 8.8 MB
  523. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.7 Container Cross-Communication hide01.ir.webm 6.3 MB
  524. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.8 Docker Networking hide01.ir.webm 8.9 MB
  525. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.4 Docker/5.4.9 Container Networking hide01.ir.webm 5.1 MB
  526. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.1 Course Roadmap hide01.ir.webm 1.1 MB
  527. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.2 Docker Vulnerabilities hide01.ir.webm 6.6 MB
  528. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.3 Docker Capabilities hide01.ir.webm 1.6 MB
  529. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.4 Docker.sock hide01.ir.webm 4.8 MB
  530. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.5 Abusing Docker.sock hide01.ir.webm 1.8 MB
  531. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.6 Hardening Containers hide01.ir.webm 4.5 MB
  532. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.5 Docker Vulnerabilities/5.5.7 Assessing Docker hide01.ir.webm 149.4 MB
  533. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.1 Course Roadmao hide01.ir.webm 4.1 MB
  534. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.10 Kubernetes Control Plane hide01.ir.webm 9.2 MB
  535. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.11 RBAC hide01.ir.webm 6.5 MB
  536. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.12 Pods hide01.ir.webm 4.7 MB
  537. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.13 Privileged Pods hide01.ir.webm 11.9 MB
  538. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.14 Keeping Secrets in Kubernetes hide01.ir.webm 6.1 MB
  539. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.15 Tesla Example hide01.ir.webm 5.0 MB
  540. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.16 Kubeflow Dashboard hide01.ir.webm 4.6 MB
  541. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.17 Kubernetes Authorization Example hide01.ir.webm 6.4 MB
  542. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.18 RBAC Example hide01.ir.webm 2.8 MB
  543. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.19 Namespaces hide01.ir.webm 949.0 KB
  544. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.2 Kubernetes hide01.ir.webm 6.6 MB
  545. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.20 Network Attacks hide01.ir.webm 2.1 MB
  546. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.21 Vulnerabilty Hunting in Kubernetes hide01.ir.webm 7.8 MB
  547. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.22 Kubernetes and ScoutSuite hide01.ir.webm 1.2 MB
  548. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.23 Automated Attack with Peirates hide01.ir.webm 1.4 MB
  549. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.24 Peirates Options hide01.ir.webm 1.6 MB
  550. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.25 Kubernetes and Peirates hide01.ir.webm 109.3 MB
  551. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.3 Kubernetes Architecture (1) hide01.ir.webm 2.8 MB
  552. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.4 Kubernetes Architecture (2) hide01.ir.webm 5.6 MB
  553. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.5 Kubernetes Nodes hide01.ir.webm 2.8 MB
  554. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.6 Kubernetes Architecture (3) hide01.ir.webm 2.0 MB
  555. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.7 Tooling in Kubernetes hide01.ir.webm 12.6 MB
  556. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.8 Attackers View of the Kubernetes hide01.ir.webm 5.4 MB
  557. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.6 Kubernetes/5.6.9 Types of Deployments hide01.ir.webm 4.8 MB
  558. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.1 Course Roadmap hide01.ir.webm 2.5 MB
  559. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.10 Contacts and Resources hide01.ir.webm 92.6 KB
  560. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.2 Implanting Backdoor in Containers hide01.ir.webm 3.3 MB
  561. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.3 Kubernetes and Payloads hide01.ir.webm 8.2 MB
  562. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.4 Backdoor Container Workflow hide01.ir.webm 6.6 MB
  563. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.5 Choosing Deployments in Kubernetes hide01.ir.webm 9.7 MB
  564. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.6 Example Deployment .yaml hide01.ir.webm 1.8 MB
  565. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.7 Backdooring Containers hide01.ir.webm 144.2 MB
  566. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.8 What is Next hide01.ir.webm 11.8 MB
  567. SEC588 Videos 2023 hide01.ir/5. Infrastructure Attacks and Red Teaming/5.7 Backdooring Containers/5.7.9 Summary hide01.ir.webm 5.6 MB
  568. SEC588 Videos 2023 hide01.ir/6 Capstone Event/6.1 Capstone Event/6.1.1 Capstone Event hide01.ir.webm 1.7 MB
  569. SEC588 Videos 2023 hide01.ir/6 Capstone Event/6.1 Capstone Event/6.1.2 Capstone Event Rules hide01.ir.webm 208.3 MB
  570. SEC588 Videos 2023 hide01.ir/6 Capstone Event/6.1 Capstone Event/6.1.3 Course Resources and Contact Information hide01.ir.webm 1.3 MB
  571. SEC588 Videos 2023 hide01.ir/hide01.ir 71 bytes

Similar Posts:

  1. Other SANS SEC588 - Cloud Penetration Testing (2023) Sept. 14, 2025, 10:35 a.m.