Index of /pentesting/SEC588/SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/
Index of /pentesting/SEC588/SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.4 Deployment Pipelines and Attacks/
../
4.4.1 Course Roadmap hide01.ir.webm 09-Jul-2024 23:23 1M
4.4.10 Travis Example hide01.ir.webm 09-Jul-2024 23:29 6M
4.4.11 Travis Configuration Files hide01.ir.webm 09-Jul-2024 23:29 4M
4.4.12 Using Travis to Move Laterally hide01.ir..> 09-Jul-2024 23:30 5M
4.4.13 Tips on Output hide01.ir.webm 09-Jul-2024 23:30 7M
4.4.14 Several use Cases hide01.ir.webm 09-Jul-2024 23:30 6M
4.4.15 Example Scripts hide01.ir.webm 09-Jul-2024 23:31 5M
4.4.16 Abusing CI CD Pipelines hide01.ir.webm 09-Jul-2024 23:32 78M
4.4.2 Development Pipeline and Attacks hide01.i..> 09-Jul-2024 23:23 7M
4.4.3 Git hide01.ir.webm 09-Jul-2024 23:24 11M
4.4.4 Deployment Pipelines hide01.ir.webm 09-Jul-2024 23:24 14M
4.4.5 Gitops hide01.ir.webm 09-Jul-2024 23:25 7M
4.4.6 Nobelium Case Study hide01.ir.webm 09-Jul-2024 23:26 14M
4.4.7 Build Systems hide01.ir.webm 09-Jul-2024 23:27 9M
4.4.8 Detecting CI CD Tools hide01.ir.webm 09-Jul-2024 23:27 7M
4.4.9 Attacking CI CD hide01.ir.webm 09-Jul-2024 23:28 15M