Index of /pentesting/SEC588/SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/

Index of /pentesting/SEC588/SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/


../
4.8.1 Course Roadmap hide01.ir.webm                10-Jul-2024 01:34      1M
4.8.10 Azure Serverless hide01.ir.webm             10-Jul-2024 01:38     13M
4.8.11 Attackers View of Windows Functions hide..> 10-Jul-2024 01:39     10M
4.8.12 Attacking Serverless Functions hide01.ir..> 10-Jul-2024 01:39      1M
4.8.13 Serverless Functions hide01.ir.webm         10-Jul-2024 01:40    104M
4.8.2 Serverless Function Attacks hide01.ir.webm   10-Jul-2024 01:34      5M
4.8.3 AWS Lambda hide01.ir.webm                    10-Jul-2024 01:35      8M
4.8.4 AWS Lambda Constraints hide01.ir.webm        10-Jul-2024 01:35      5M
4.8.5 NodeJS Lambda Example - JavaScript hide01..> 10-Jul-2024 01:35      7M
4.8.6 Lambda Limitations hide01.ir.webm            10-Jul-2024 01:37      6M
4.8.7 Executing Lambda Functions Manually hide0..> 10-Jul-2024 01:37      5M
4.8.8 Exploits in Lambda Software hide01.ir.webm   10-Jul-2024 01:37      6M
4.8.9 AWS Lambda Shells hide01.ir.webm             10-Jul-2024 01:38      6M