Attackers Follow Security Principles Too
![](https://i.ytimg.com/vi/zyKYLcYaX1w/mqdefault.jpg)
1:03:58
Using Apeman to Discover Attack Paths in AWS
![](https://i.ytimg.com/vi/2o8iZXQSSMU/mqdefault.jpg)
1:08:40
Synced User Attack Path Analysis with BloodHound
![](https://i.ytimg.com/vi/MFxhirfFSp4/mqdefault.jpg)
1:01:05
Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover
![](https://i.ytimg.com/vi/idssoTmERw8/mqdefault.jpg)
59:02
Building Our Nemesis
![](https://i.ytimg.com/vi/Qw9fc6nosfc/mqdefault.jpg)
43:36
Staff+ Engineering: Leadership Beyond the Management Track | Petr Zemek
![](https://i.ytimg.com/vi/ivPu2EQ8VVg/mqdefault.jpg)
1:14:42
To Infinity and Beyond: Building Purple Team Test Cases
![](https://i.ytimg.com/vi/pRIzspJJgtA/mqdefault.jpg)
24:26
MBAide Speaker Series December 06, 2024
![](https://i.ytimg.com/vi/Xg72deK8Jos/mqdefault.jpg)
1:01:07