Index of /pentesting/SEC588/SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/

Index of /pentesting/SEC588/SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/


../
4.4.1 Course Roadmap hide01.ir.webm                09-Jul-2024 23:23      1M
4.4.10 Travis Example hide01.ir.webm               09-Jul-2024 23:29      6M
4.4.11 Travis Configuration Files hide01.ir.webm   09-Jul-2024 23:29      4M
4.4.12 Using Travis to Move Laterally hide01.ir..> 09-Jul-2024 23:30      5M
4.4.13 Tips on Output hide01.ir.webm               09-Jul-2024 23:30      7M
4.4.14 Several use Cases hide01.ir.webm            09-Jul-2024 23:30      6M
4.4.15 Example Scripts hide01.ir.webm              09-Jul-2024 23:31      5M
4.4.16 Abusing CI CD Pipelines hide01.ir.webm      09-Jul-2024 23:32     78M
4.4.2 Development Pipeline and Attacks hide01.i..> 09-Jul-2024 23:23      7M
4.4.3 Git hide01.ir.webm                           09-Jul-2024 23:24     11M
4.4.4 Deployment Pipelines hide01.ir.webm          09-Jul-2024 23:24     14M
4.4.5 Gitops hide01.ir.webm                        09-Jul-2024 23:25      7M
4.4.6 Nobelium Case Study hide01.ir.webm           09-Jul-2024 23:26     14M
4.4.7 Build Systems hide01.ir.webm                 09-Jul-2024 23:27      9M
4.4.8 Detecting CI CD Tools hide01.ir.webm         09-Jul-2024 23:27      7M
4.4.9 Attacking CI CD hide01.ir.webm               09-Jul-2024 23:28     15M