Index of /pentesting/SEC588/SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/
Index of /pentesting/SEC588/SEC588 Videos 2023 hide01.ir/4 Vulnerabilities in Cloud-Native Applications/4.8 Serverless Function Attacks/
../
4.8.1 Course Roadmap hide01.ir.webm 10-Jul-2024 01:34 1M
4.8.10 Azure Serverless hide01.ir.webm 10-Jul-2024 01:38 13M
4.8.11 Attackers View of Windows Functions hide..> 10-Jul-2024 01:39 10M
4.8.12 Attacking Serverless Functions hide01.ir..> 10-Jul-2024 01:39 1M
4.8.13 Serverless Functions hide01.ir.webm 10-Jul-2024 01:40 104M
4.8.2 Serverless Function Attacks hide01.ir.webm 10-Jul-2024 01:34 5M
4.8.3 AWS Lambda hide01.ir.webm 10-Jul-2024 01:35 8M
4.8.4 AWS Lambda Constraints hide01.ir.webm 10-Jul-2024 01:35 5M
4.8.5 NodeJS Lambda Example - JavaScript hide01..> 10-Jul-2024 01:35 7M
4.8.6 Lambda Limitations hide01.ir.webm 10-Jul-2024 01:37 6M
4.8.7 Executing Lambda Functions Manually hide0..> 10-Jul-2024 01:37 5M
4.8.8 Exploits in Lambda Software hide01.ir.webm 10-Jul-2024 01:37 6M
4.8.9 AWS Lambda Shells hide01.ir.webm 10-Jul-2024 01:38 6M