<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://jasmith.me/Exam+Retrospectives/4+-+CISSP</loc></url><url><loc>https://jasmith.me/Exam+Retrospectives/3+-+CIPP-US</loc></url><url><loc>https://jasmith.me/JA+Smith+Home</loc></url><url><loc>https://jasmith.me/Copyright+Notice</loc></url><url><loc>https://jasmith.me/Exam+Retrospectives/1+-+Network%2B+(N10-008)</loc></url><url><loc>https://jasmith.me/Exam+Retrospectives/2+-+Security%2B+(SY0-701)</loc></url><url><loc>https://jasmith.me/Exam+Retrospectives/5+-+Linux%2B+(XK0-005)</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Systemd/_Overview+%26+Related+Daemons</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Systemd/Journalctl</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Systemd/Sysctl</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Systemd/Systemctl</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Systemd/Unit+Files</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/IaC+%26+SW+Dev+Concepts</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/_Netcat+(todo)</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Troubleshooting/User+Issues</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Troubleshooting/Systemd+Tools</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Troubleshooting/HW+%26+Networking+Issues</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Troubleshooting/File+Issues</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Troubleshooting/CPU+%26+Memory+Issues</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Troubleshooting/Boot+%26+Storage+Issues</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Sudo</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/System+Authentication</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Special+Bits</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/SSH</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/SELinux</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/SAN+%26+NAS</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/RAID+%26+LUKS</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Process+%26+Job+Mgmt</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Preparing+%26+Installing+Distros</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Perms%2C+ACLs%2C+%26+Attributes</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Perms+and+ownership</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Partitions%2C+FS%2C+%26+Mounting</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Package+Mgmt</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Networking+Related</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Logging</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Locale+%26+Time</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/LVM</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Kernel+Modules</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Hardening</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Firewalls</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/File+Tools%2C+Links%2C+%26+Stats</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/File+Sorting+%26+Comparison</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/File+Backup+(rsync+%26+SFTP)</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/File+%26+Stream+Manipulation</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/FHS+(File+Hierarchy+Std)</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Curl+%26+wget</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Crypt%2C+hashing%2C+dig+sigs</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Cron+%26+AT</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/CLI+Basics</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Boot+Targets+%26++Runlevels</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Boot+Process</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Basic+System+Architecture</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/BASH+Scripting+Overview</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/BASH+%26+RegEx+Meta-Chars</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Archiving+%26+Compressing</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/AppArmor</loc></url><url><loc>https://jasmith.me/4+-+Linux%2B+(XK0-005)+Notes/Acct+%26+Password+Mgmt</loc></url><url><loc>https://jasmith.me/3+-+Git/Hooks</loc></url><url><loc>https://jasmith.me/3+-+Git/Connection+to+Remote+Repo</loc></url><url><loc>https://jasmith.me/3+-+Git/Basics</loc></url><url><loc>https://jasmith.me/3+-+Git/Daily+Push+Script</loc></url><url><loc>https://jasmith.me/2+-+Docker+%26+Kubernetes/Repositories+%26+Registries</loc></url><url><loc>https://jasmith.me/2+-+Docker+%26+Kubernetes/Docker+Networks</loc></url><url><loc>https://jasmith.me/2+-+Docker+%26+Kubernetes/Docker+Swarm</loc></url><url><loc>https://jasmith.me/2+-+Docker+%26+Kubernetes/Kubernetes</loc></url><url><loc>https://jasmith.me/2+-+Docker+%26+Kubernetes/Docker+Compose</loc></url><url><loc>https://jasmith.me/2+-+Docker+%26+Kubernetes/Dockerfiles</loc></url><url><loc>https://jasmith.me/2+-+Docker+%26+Kubernetes/Docker+Basics</loc></url><url><loc>https://jasmith.me/1+-+BASH+scripting/Variables</loc></url><url><loc>https://jasmith.me/1+-+BASH+scripting/Loops</loc></url><url><loc>https://jasmith.me/1+-+BASH+scripting/Getting+Data+into+Scripts</loc></url><url><loc>https://jasmith.me/1+-+BASH+scripting/Conditional+Statements</loc></url><url><loc>https://jasmith.me/1+-+BASH+scripting/Command+Substitution</loc></url><url><loc>https://jasmith.me/1+-+BASH+scripting/Arguments</loc></url><url><loc>https://jasmith.me/2+-+Docker+%26+Kubernetes/_Install+Docker+%26+Bloodhound</loc></url><url><loc>https://jasmith.me/0+-+Home+Lab+Setup/4+-+Windows+Host</loc></url><url><loc>https://jasmith.me/0+-+Home+Lab+Setup/3+-+Docker+Setup</loc></url><url><loc>https://jasmith.me/0+-+Home+Lab+Setup/0+-+Kali+VM+Setup</loc></url><url><loc>https://jasmith.me/0+-+Home+Lab+Setup/2+-+Client+SSH+Setup+with+Yubikey+PIV</loc></url><url><loc>https://jasmith.me/0+-+Home+Lab+Setup/1+-+File+Server</loc></url><url><loc>https://jasmith.me/0+-+Home+Lab+Setup/5+-+Obsidian+Setup</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Web+Proxies</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/SQLmap+Essentials</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/SQL+Injection+Fundamentals</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Ffuf+Web+Fuzzing</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Command+Injection</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Windows+Privesc/_Lessons+Learned</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Windows+Privesc/Part+II</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Windows+Privesc/Part+I</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Web+Attacks/3+-+Endgame+-+Verb+Tampering+%26+XXE</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Web+Attacks/2+-+IDOR+vector+-+API+calls</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Web+Attacks/1+-+Initial+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Web+Attacks/0+-+Takeaways</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Shells+%26+Payload/172.16.1.13+-+nmap</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Shells+%26+Payload/172.16.1.13+-+exploit</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Shells+%26+Payload/172.16.1.12+-+nmap</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Shells+%26+Payload/172.16.1.12+-+http+(80)+exploited</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Shells+%26+Payload/172.16.1.11+-+smb+(445)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Shells+%26+Payload/172.16.1.11+-+nmap</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Shells+%26+Payload/172.16.1.11+-+http+(8080)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Shells+%26+Payload/172.16.1.11+-+http+(80)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Pivoting/6+-+Enum+172.16.6.45</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Pivoting/5+-+Enum+172.16.6.25+(PIVOTWIN10)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Pivoting/4+-+Pivot_B+and+172.15.6.0+Subnet+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Pivoting/3+-+Enum+172.16.5.35+(PIVOT-SRV01)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Pivoting/2+-+Pivot_A+and+172.15.5.0+Subnet+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Pivoting/1+-+Intital+webserver</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Pivoting/0+-+Overview</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Password+Attacks/6+-+Enum+-+DC01</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Password+Attacks/5+-+Enum+-+JUMP01</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Password+Attacks/4+-+Enum+-+FILE01</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Password+Attacks/3+-+Pivot+%26+Internal+Recon</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Password+Attacks/2+-+Enum+-+DMZ01</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Password+Attacks/1+-+Recon+%26+Foothold+-+DMZ01</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Password+Attacks/0+-+Overview</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Login+Brute+Forcing/Part+II</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Login+Brute+Forcing/Part+I</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/9+-+GTFObins</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/8+-+linpeas.sh</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/7+-+Dirty+Pipe</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/6+-+screen+exploit</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/5+-+Tomcat+Enum+Revisited</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/4+-+MySQL+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/3+-+Barry+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/2+-+Tomcat+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Linux+Privsec/1+-+Initial+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Footprinting/3+-+Hard</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Footprinting/2+-+Medium</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Footprinting/1+-+Easy</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Upload+Attacks/5+-+Endgame</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Upload+Attacks/4+-+Grab+source+code+for+upload.php</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Upload+Attacks/3+-+Reset</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Upload+Attacks/2+-+Get+upload+functioning</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Upload+Attacks/1+-+Initial+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Inclusion/5+-+leverage+region+parameter+in+contact.php</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Inclusion/4+-+source+code+of+.php+files</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Inclusion/3+-+image.php</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Inclusion/2+-+apply.php+and+thanks.php</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/File+Inclusion/1+-+Initial+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Common+Services/3+-+Hard</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Common+Services/2+-+Medium</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Common+Services/1+-+Easy</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Attacking+Common+Apps/3+-+Assessment+Part+Three</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Attacking+Common+Apps/2+-+Assessment+Part+Two</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/Attacking+Common+Apps/1+-+Assessment+Part+One</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/_Takeaways</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/9+-+BloodHound+%26+Inveigh</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/8+-+Renewed+MS01+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/7+-+SQL01</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/6+-+Internal+MS01+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/5+-+Renewed+MS01+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/4+-+Responder</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/3+-+Valid+User+Names+%26+Blind+Spraying</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/2+-+Initial+MS01+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/11+-+Grab+NTLM+hash+for+KRBTGT</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/10+-+ACL+Abuse+for+DC01+Compromise</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+II/1+-+Initial+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/8+-+MS01+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/9+-+DC01+Compromise</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/7+-+Internal+Subnet+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/6+-+Setup+Pivot+Through+WEB-WIN01</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/5+-+Domain+Enum+through+WEB-WIN01</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/4+-+Metasploit+revshell</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/2+-+Webshell+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/3+-+WEB-WIN01+Fails</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/AD+Enum+%26+Attacks/Part+I/1+-+External+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/4+-+Skills+Assessments/XSS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/1+-+External+Enum/5+-+Ffuf+Dir+%26+Ext+Mapping</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/1+-+External+Enum/6+-+Web+App+Testing+%26+Exploitation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/1+-+External+Enum/4+-+Ffuf+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/1+-+External+Enum/3+-+Default+Creds+Attack+Sequence</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/1+-+External+Enum/2+-+Service+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/1+-+External+Enum/1+-+External+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/2+-+Gaining+a+Foothold/2+-+Web+App+Pillaging+%26+Flag+Hunting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/2+-+Gaining+a+Foothold/1+-+Shell+Upgrade</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/_Overview</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/Org+tips</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/9+-+Post-Engagement</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/8+-+Proof-of-Concept</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/7+-+Lateral+Movement</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/6+-+Post-exploitation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/5+-+Exploitation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/4+-+Vulnerability+Assessment</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/3+-+Info+Gathering</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/2+-+Pre-engagement</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/1+-+Process+Overview</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/Misc/_In+progress</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/9+-+Tomcat+-+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/8+-+Attacking+Drupal</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/7+-+Drupal+-+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/6+-+Attacking+Joomla</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/5+-+Joomla+-+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/4+-+Attacking+WordPress</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/30+-+App+Hardening</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/3+-+WordPress+-+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/29+-+Other+Notable+Apps</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/28+-+Attacking+Apps+Connecting+to+Services</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/27+-+Web+Mass+Assignment+Vulns</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/26+-+Attacking+LDAP</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/25+-+IIS+Tilde+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/24+-+Attacking+ColdFusion</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/23+-+ColdFusion+-+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/22+-+Exploiting+Web+Vulns+in+Thick+Client+Apps</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/20+-+Attacking+CGI+Apps</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/21+-+Attacking+Thick+Client+Apps</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/2+-+Application+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/19+-+Attacking+Tomcat+CGI</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/18+-+Attacking+GitLab</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/17+-+Gitlab+-+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/16+-+osTicket</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/12+-+Attacking+Jenkins</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/15+-+PRTG+Network+Monitor</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/14+-+Attacking+Splunk</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/13+-+Splunk+-+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/11+-+Jenkins+-+Discovery+%26+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/22+-+Attacking+Common+Web+Apps/10+-+Attacking+Tomcat</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/3+-+File+Transfers/8+-+Detection+%26+Evading+Detection</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/3+-+File+Transfers/7+-+Living+off+the+Land+(LOL)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/3+-+File+Transfers/5+-+Protected+File+Transfer</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/3+-+File+Transfers/6+-+Catching+Files+over+HTTP-S</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/3+-+File+Transfers/3+-+Transferring+Files+with+Code</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/3+-+File+Transfers/4+-+Misc+File+Transfer</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/3+-+File+Transfers/2+-+Linux+File+Transfer</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/3+-+File+Transfers/1+-+Windows+File+Transfer</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/3+-+Enumeration+Principles+%26+Methodology</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/2+-+Infrastructure+Enumeration</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/Windows+Remote+Mgmt+(RDP%2C+WinRM%2C+WMI)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/SNMP+(161%2C162)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/Oracle+TNS+(1521)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/SMTP+(25%2C465%2C587)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/SMB+(139%2C445)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/NFS+(111%2C2049)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/MySQL+(3306)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/Linux+Remote+Mgmt+(SSH%2C+Rsync%2C+R-Services)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/MSSQL+(1433)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/IPMI+(623)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/IMAP+(143%2C993)+%26+POP3+(110%2C995)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/FTP+(20%2C21)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/2+-+Footprinting/1+-+Service+Enumeration/DNS+(53)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/0+-+Getting+Started/VPN+Setup</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/0+-+Getting+Started/8+-+Resources</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/0+-+Getting+Started/7+-+Transferring+Files</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/0+-+Getting+Started/6+-+Privilege+Escalation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/0+-+Getting+Started/4+-+Public+Exploits</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/0+-+Getting+Started/3+-+Web+Enumeration</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/0+-+Getting+Started/2+-+Service+Scanning</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/0+-+Getting+Started/1+-+Basic+Tools</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/1+-+Network+Enum+with+nmap/4+-+FW+%26+IDS-IPS+Evasion</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/1+-+Network+Enum+with+nmap/3+-+Nmap+Scripting+Engine+(NSE)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/1+-+Network+Enum+with+nmap/2+-+NMap+Performance+Tweaks</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/1+-+Network+Enum+with+nmap/1+-+Intro+to+Nmap</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/9+-+Web+Archives</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/7+-+Crawling%2C+robots.txt%2C+.well-known+URIs</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/8+-+Search+Engine+Discovery</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/6+-+Fingerprinting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/5+-+Certificate+Transparency+Logs</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/4+-+Subdomains</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/2+-+DNS+Overview</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/3+-+Digging+DNS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/10+-+Recon+Automation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/1+-+WHOIS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/9+-+Info+Gathering+(web)/0+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/9+-+Web+Server+Pivoting+with+rpivot</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/8+-+SSH+Pivoting+with+sshuttle</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/7+-+SSH+for+Windows+(plink)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/5+-+Socat+Redirection+with+Rev+Shell</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/6+-+Socat+Redirection+with+Bind+Shell</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/4+-+Meterpreter+Tunneling+%26+Port+Forwarding</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/3+-+Remote-Reverse+Port+Forwarding+with+SSH</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/2+-+Dynamic+Port+Forwarding+with+SSH+%26+SOCKS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/1b+-+Ligolo-ng+Double+Pivot</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/1a+-+Ligolo-ng+Single+Forward+Pivot</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/14+-+Double+Pivot+with+SocksOverRDP</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/13+-+ICMP+Tunneling+with+SOCKS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/12+-+SOCKS5+Tunneling+with+Chisel</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/11+-+DNS+Tunneling+with+dnscat2</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/10+-+Windows+Port+Forwarding+with+netsh</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/0a+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/8+-+Pivoting/0a+-+Pivoting+Tools</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/9+-+Attacking+LSASS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/7+-+Windows+Authentication+Process</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/8+-+Attacking+SAM%2C+SYSTEM%2C+%26+SECURITY</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/5+-+Cracking+Protected+Files+%26+Archives</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/6+-+Remote+Password+Attacks</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/4+-+Writing+Custom+Wordlists+%26+Rules</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/19+-+Pass+the+Certificate+(PtC)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/3+-+Hashcat</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/20+-+Password+Mgmt</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/2+-+John+the+Ripper</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/18+-+Pass+the+Ticket+(PtT)+from+Linux</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/17+-+Pass+the+Ticket+(PtT)+from+Windows</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/16+-+Pash+the+Hash+(PtH)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/15+-+Network+Traffic+%26+Share+Hunting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/14+-+Linux+Cred+Hunting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/12+-+Windows+Cred+Hunting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/13+-+Linux+Auth+Process</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/11+-+Attacking+AD+%26+NTDS.dit</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/10+-+Attacking+Windows+Cred+Mgr</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/6+-+Password+Attacks/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/7+-+Attacking+Common+Services/6+-+DNS+(53)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/7+-+Attacking+Common+Services/5+-+RDP+(3389)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/7+-+Attacking+Common+Services/4+-+SQL+DBs+(1433%2C3306)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/7+-+Attacking+Common+Services/3+-+SMB+(139%2C445)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/7+-+Attacking+Common+Services/2+-+FTP+(20%2C21)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/7+-+Attacking+Common+Services/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/5+-+Using+Metasploit/7+-+Additional+Features</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/5+-+Using+Metasploit/6+-+MSF+Sessions</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/5+-+Using+Metasploit/4+-+MSF+Encoders+%26+DBs</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/5+-+Using+Metasploit/5+-+MSF+Plugins+%26+Mixins</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/5+-+Using+Metasploit/3+-+MSF+Targets+%26+Payloads</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/5+-+Using+Metasploit/2+-+MSF+Modules</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/5+-+Using+Metasploit/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/9+-+Detection+%26+Prevention</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/8+-+Web+Shells</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/7+-+Infiltrating+Linux</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/6+-+Infiltrating+Windows</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/4+-+Automating+Payload+Creation+%26+Delivery+with+MSF</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/5+-+Crafting+a+Payload+with+MSFVenom</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/3+-+Intro+to+Payloads</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/2+-+Shell+Basics</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/4+-+Shells+%26+Payloads/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/11+-+Capabilities</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/22+-+Python+Lib+Hijacking</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/21+-+SO+Hijacking</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/20+-+Shared+Libs</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/2+-+Env+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/9+-+Sudo+Rights+Abuse</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/8+-+SUID+%26+SGID</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/7+-+Escaping+Restricted+Shells</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/6+-+Wildcard+Abuse</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/5+-+PATH+Abuse</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/4+-+Cred+Hunting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/3+-+Services+%26+Internals+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/28+-+Linux+Hardening</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/27+-+netfilter+(recent+0-day)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/25+-+polkit+(recent+0-day)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/26+-+dirty+pipe+(recent+0-day)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/23+-+sudo+(recent+0-day)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/19+-+Kernel+Exploits</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/18+-+Misc+Techniques</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/17+-+Logrotate</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/16+-+Kubernetes</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/15+-+Docker</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/14+-+LXD+%26+LXC</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/13+-+Cron+Job+Abuse</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/12+-+screen+(vulnerable+service)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/10+-+Privileged+Groups</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/23+-+Linux+Privesc/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/31+-+Windows+Hardening</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/30+-+Windows+Desktop</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/29+-+Windows+Server</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/28+-+Legacy+OS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/27+-+Misc+Techniques</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/26+-+Pillaging</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/25+-+Interacting+with+Users</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/24+-+Citrix+Breakout</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/23+-+Further+Cred+Theft</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/22+-+Hunting+for+Other+Files</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/21+-+Hunting+for+Creds</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/20+-+DLL+Injection</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/19+-+Vulnerable+Services</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/18+-+Kernel+Exploits</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/5+-+Comm+with+Processes</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/17+-+Weak+Perms</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/16+-+Bypassing+UAC</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/13+-+Hyper-V+Admins+Group</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/15+-+Server+Operators+Group</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/14+-+Print+Operators+Group</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/12+-+DnsAdmins+Group</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/11+-+Event+Log+Readers+Group</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/10+-+Backup+Operators+Group</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/9+-+SeTakeOwnership</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/7+-+SeImpersonate+%26+SeAssignPrimaryToken</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/8+-+SeDebug</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/6+-+Windows+Privs+Overview</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/4+-+Initial+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/3+-+Situational+Awareness</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/2+-+Windows+Privesc+Tools</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/24+-+Windows+Privesc/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/9+-+Bypassing+Encoded+References</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/8+-+Mass+IDOR+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/7+-+Identifying+IDORs</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/5+-+Verb+Tampering+Protection</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/6+-+Intro+to+IDOR</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/4+-+Bypassing+Security+Filters</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/3+-+Bypassing+Basic+Authentication</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/2+-+Intro+to+HTTP+Verb+Tampering</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/16+-+Blind+Data+Exfiltration</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/17+-+XXE+Prevention</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/15+-+Advanced+File+Disclosure</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/14+-+Local+File+Disclosure</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/13+-+Intro+to+XXE</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/10+-+IDOR+in+Insecure+APIs</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/11+-+Chaining+IDOR+Vulns</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/21+-+Web+Attacks/12+-+IDOR+Prevention</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/9+-+Advanced+Command+Bypasses</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/8+-+Bypassing+Blacklisted+Commands</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/7+-+Bypassing+Other+Blacklisted+Chars</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/6+-+Bypassing+Space+Filters</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/5+-+Identifying+Filters</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/4+-+Other+Injection+Operators</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/3+-+Injecting+Commands</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/2+-+Injection+Operators+%26+Detection</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/11+-+Command+Injection+Prevention</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/10+-+Evasion+Tools</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/20+-+Command+Injection/0+-+Command+Injection+Tip-Offs</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/9+-+Other+Upload+Attacks</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/8+-+Limited+File+Uploads</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/7+-+Type+Filters</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/6+-+Whitelist+Filters</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/5+-+Blacklist+Filters</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/4+-+Client-Side+Validation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/10+-+Preventing+File+Upload+Vulns</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/3+-+Upload+Exploitation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/2+-+Exploiting+Absent+Validation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/19+-+File+Upload+Attacks/1+-+Intro</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/9+-+Automated+Scanning</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/8+-+Log+Poisoning</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/7+-+LFI-enabled+File+Upload+Attacks</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/6+-+RFI</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/5+-+PHP+Wrappers</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/4+-+PHP+Filters</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/2+-+LFI</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/3+-+Basic+Bypasses</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/10+-+File+Inclusion+Prevention</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/18+-+File+Inclusion/1+-+Intro</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/9+-+OS+Exploitation</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/8+-+Bypassing+Web+App+Protections</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/7+-+Advanced+DB+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/6+-+DB+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/5+-+Attack+Tuning</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/4+-+Handling+SQLmap+Errors</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/3+-+Running+SQLmap+on+an+HTTP+Request</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/2+-+Getting+Started+with+SQLmap</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/16+-+SQLmap+Essentials/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/17+-+XSS/8+-+XSS+Prevention</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/17+-+XSS/7+-+Session+Hijacking</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/17+-+XSS/6+-+Phising</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/17+-+XSS/5+-+XSS+Discovery</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/17+-+XSS/2+-+Stored+XSS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/17+-+XSS/4+-+DOM+XSS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/17+-+XSS/3+-+Reflected+XSS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/17+-+XSS/1+-+XSS+Basics</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/9+-+Union+Clause</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/8+-+Using+Comments+to+Subvert+Query+Logic</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/7+-+Subverting+Query+Logic+with+OR+Operator</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/6+-+Intro+to+SQL+Injections</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/5+-+MySQL+Operators</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/4+-+MySQL+Manipulation+of+Query+Results</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/3+-+MySQL+Statements</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/2+-+Intro+to+MySQL</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/14+-+Mitigating+SQL+Injections</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/13+-+Writing+Files</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/12+-+Reading+Files</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/11+-+DB+Enumeration</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/10+-+Union+Injection</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/15+-+SQL+Injection+Fundamentals/1+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/9+-+Medusa+-+Web+Services</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/8+-+Medusa+-+Intro</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/6+-+Hydra+-+Basic+HTTP+Auth</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/5+-+Hydra+-+Intro</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/4+-+Hybrid+Attacks</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/3+-+Dictionary+Attacks</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/2+-+Brute+Force+Attacks</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/10+-+Custom+Wordlists</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/1+-+Overview</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/13+-+Web+Fuzzing+with+Ffuf/6+-+Parameter+Fuzzing</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/13+-+Web+Fuzzing+with+Ffuf/5+-+Filtering+Results</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/13+-+Web+Fuzzing+with+Ffuf/4+-+Sub-Domain+%26+Vhost+Fuzzing</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/13+-+Web+Fuzzing+with+Ffuf/3+-+Recursive+Fuzzing</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/13+-+Web+Fuzzing+with+Ffuf/1+-+Directory+Fuzzing</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/13+-+Web+Fuzzing+with+Ffuf/2+-+Extension+%26+Page+Fuzzing</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/12+-+Web+Proxies/8+-+Web+Scanners</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/12+-+Web+Proxies/7+-+Web+Fuzzers</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/12+-+Web+Proxies/6+-+Proxying+Tools</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/12+-+Web+Proxies/5+-+Encoding+%26+Decoding</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/12+-+Web+Proxies/4+-+Automatic+Modifications</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/12+-+Web+Proxies/3+-+Intercepting+Responses</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/12+-+Web+Proxies/2+-+Intercepting+Requests</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/12+-+Web+Proxies/1+-+Introduction+%26+Setup</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/9+-+Living+Off+the+Land</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/8+-+Credentialed+Enum+from+Windows</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/7+-+Credentialed+Enum+from+Linux</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/6+-+Enumerating+Security+Controls</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/5+-+Internal+Password+Spraying</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/4+-+Creating+a+User+List</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/28+-+AD+Auditing</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/3+-+Determining+Domain's+Password+Policy</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/26+-+Cross+Forest+Trust+Abuse+from+Linux</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/27+-+Hardening+AD</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/23+-+Child-Parent+Domain+Trust+Attacks+from+Windows</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/25+-+Cross+Forest+Trust+Abuse+from+Windows</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/24+-+Child-Parent+Domain+Trust+Attacks+from+Linux</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/22+-+Domain+Trusts</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/21+-+GPO+Abuse</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/20+-+ASREProasting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/2+-+LLMNR+%26+NBT-NS+Poisoning</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/19+-+Misc+Misconfigs</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/18+-+noPac%2C+PrintNightmare%2C+PetitPotam</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/17+-+Kerberos+Double+Hop</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/16+-+Privileged+Access</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/15+-+DCSync</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/14+-+ACL+Abuse+Tactics</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/13+-+ACL+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/12+-+ACL+Abuse+Primer</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/11+-+Kerberoasting+from+Windows</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/10+-+Kerberoasting+from+Linux</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/1+-+Initial+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/11+-+AD+Enum+%26+Attacks/0+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/10+-+Vuln+Assessments/2+-+Vuln+Scanning+with+Nessus+%26+OpenVAS</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/10+-+Vuln+Assessments/1+-+CVSS+%26+CVE</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/10+-+Vuln+Assessments/0+-+Introduction</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/7+-+Reporting+%26+Cleanup/3+-+Reporting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/7+-+Reporting+%26+Cleanup/2+-+Flag+%26+Tool+Cleanup</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/7+-+Reporting+%26+Cleanup/1+-+Flag+Summary+%26+Reporting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/6+-+AD+Hacking+%26+Cred+Maxing/6+-+Cred+Hunting+%26+Box+Maxxing</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/6+-+AD+Hacking+%26+Cred+Maxing/4+-+Cred+Reuse+Across+Services</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/6+-+AD+Hacking+%26+Cred+Maxing/5+-+Hash+Dumping+%26+Pillaging</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/6+-+AD+Hacking+%26+Cred+Maxing/3+-+Bloodhound+Attack+Path</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/6+-+AD+Hacking+%26+Cred+Maxing/2+-+AD+Attacks</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/6+-+AD+Hacking+%26+Cred+Maxing/1+-+AD+Attack+Path</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/5+-+Privesc/4+-+Binary+%26+DLL+Pillaging</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/5+-+Privesc/3+-+RDP+Pillaging</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/5+-+Privesc/2+-+Windows+Privesc</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/5+-+Privesc/1+-+Linux+Privesc</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/4+-+Lateral+Movement/2+-+Port+Forwarding</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/4+-+Lateral+Movement/1+-+Lateral+Movement+%26+Cred+Reuse</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/3+-+Internal+Enum/7+-+Password+Cracking</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/3+-+Internal+Enum/5+-+Master+Windows+Pillaging</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/3+-+Internal+Enum/6+-+Linux+Cred+Hunting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/3+-+Internal+Enum/4+-+Windows+Cred+Hunting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/3+-+Internal+Enum/3+-+Manual+PowerShell+AD+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/3+-+Internal+Enum/2+-+Tool+Transfer</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/3+-+Internal+Enum/1+-+Internal+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/2+-+Checklists/2+-+Gaining+a+Foothold/3+-+tmux+logging</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/5+-+AD+Dominance</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/4+-+Windows+Privesc</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/3+-+Linux+Privesc</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/2+-+Webserver+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/1+-+Initial+Enum</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/14+-+Login+Brute+Forcing/7+-+Hydra+-+Login+%26+Security+Forms</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/7+-+File+Transfers</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/6+-+Shells+%26+Payloads</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/8+-+Pivoting</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/25+-+Documentation+%26+Reporting/1+-+Notetaking+%26+Organization</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/25+-+Documentation+%26+Reporting/2+-+Report+Components</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+JEEVES</loc></url><url><loc>https://jasmith.me/5+-+CPTS/0+-+Tools/3+-+Windows+Tools</loc></url><url><loc>https://jasmith.me/5+-+CPTS/0+-+Tools/2+-+Linux+Tools</loc></url><url><loc>https://jasmith.me/5+-+CPTS/0+-+Tools/1+-+Resources</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+TRICK</loc></url><url><loc>https://jasmith.me/5+-+CPTS/3+-+CPTS+Notes/7+-+Attacking+Common+Services/7+-+SMTP%2C+POP3%2C+IMAP+(25%2C110%2C143%2C465%2C587%2C993%2C995)</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/9+-+Shell+Upgrade</loc></url><url><loc>https://jasmith.me/5+-+CPTS/1+-+Methodologies/10+-+SQL+Injection</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+FLUFFY</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+POSTMAN</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+ADMINISTRATOR</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+VOLEUR</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+TOMBWATCHER</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+MONITORED</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/_AD+TEMPLATE</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/_GENERIC+TEMPLATE</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+CRAFT</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+AUTHORITY</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+VULNCICADA</loc></url><url><loc>https://jasmith.me/5+-+CPTS/5+-+Practice/HTB+-+MEDIA</loc></url></urlset>