<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://mehdi.banicarthage.com/Toji/0+-+Now/What+I%E2%80%99m+doing+Now</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/Welcome+to+my+space</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/2+-+CTFs/0+-+Web/TODO</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/0+-+Security+engineering/Fault+Trees+and+Threat+Trees+use+cases+in+Security</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/0+-+Security+engineering/Eliminating+Hazards+use+cases+in+security</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/0+-+Security+engineering/FMEA+use+cases+in+security</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/0+-+Security+engineering/!What+is+Security+engineering</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/1+-+Software/Domain+Driven+Design/Rich+Model+vs+Anemic+Model</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/1+-+Software/Domain+Driven+Design/Context-to-Context+Communication</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/1+-+Software/Domain+Driven+Design/Technical+Design+(Solution+Space)</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/1+-+Software/Domain+Driven+Design/!Introduction+to+Domain+Driven+Design</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/1+-+Software/Domain+Driven+Design/Strategic+Design+(Problem+Space)</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/2+-+CTFs/2+-+Network/TODO</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/2+-+CTFs/1+-+Hardware/TODO</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/006+Credential+Harvesting/004+Administrator+Password+Solution+(LAPS)</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/006+Credential+Harvesting/003+Windows+Credential+Manager+Credential</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/006+Credential+Harvesting/002+LSASS+and+Why+It+Matters</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/006+Credential+Harvesting/001+Local+Credentials+and+SAM+Dumping</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/006+Credential+Harvesting/000+Credential+Access</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/005+Persistence/007+Persistence+using+GPOs</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/005+Persistence/006+Persistence+using+ACLs</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/005+Persistence/004+Persistence+via+Nested+Group</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/005+Persistence/003+Persistance+using+SID+History</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/005+Persistence/002+Persistence+AD+CS+Compromise</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/005+Persistence/001+Persistence+via+Tickets</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/005+Persistence/000+Persistence+via+Credentials</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/004+Exploitation/Domain+Trust+Exploitation+via+Golden+Ticket</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/004+Exploitation/004+GPO+Abuse</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/004+Exploitation/003+User+Targeting+and+Credential+Harvesting</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/004+Exploitation/002+Machine+Account+Coercion+Attack+Theory</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/004+Exploitation/001+Kerberos+Delegation+Attack</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/004+Exploitation/000+Active+Directory+ACL-Based+Attacks</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/003+Lateral+Movement/005+Lateral+Movement+Port+Forwarding+%26+Pivoting</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/003+Lateral+Movement/004+Lateral+Movement+Backdooring+%26+RDP+Hijacking</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/003+Lateral+Movement/003+Lateral+Movement+Authentication</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/003+Lateral+Movement/002+Lateral+Movement+WMI</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/003+Lateral+Movement/001+Lateral+Movement+by+Spawning+Processes+Remotely</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/003+Lateral+Movement/000+Introduction</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/002+Enumeration/003+Enumeration+using+BloodHound+%26+SharpHound</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/002+Enumeration/002+Enumeration+using+Cmdlet+powershell</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/002+Enumeration/001+Enumeration+using+CMD</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/002+Enumeration/000+Enumration+using+GUI</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/001+Attacks/002+PXE+-+MDT+Cred+theft</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/001+Attacks/001+NetNTLM+Attacks+via+SMB+(Capture+%26+Relay)</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/001+Attacks/000+LDAP+Pass+Back</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/011+AD+-+User+and+Machine+Accounts</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/010+AD+-+GPOs</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/009+AD+-+Hardening</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/008+AD+-+Privileges</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/007+AD+-+Groups</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/006+AD+-+Kerberos</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/005+AD+-+NTLM</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/004+AD+-+DNS%2C+LDAP%2C+MSRPC</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/003+AD+-+Functionalities</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/002+AD+-+Objects</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/001+AD+-+Terminology</loc></url><url><loc>https://mehdi.banicarthage.com/Toji/1+-+Learnings/2+-+Active+Directory/000+Intro/000+AD+-+Structure</loc></url></urlset>