{"version":"1.0","provider_name":"\uff28\uff49\uff44\uff45\uff3a\uff45\uff52\uff4f\uff2f\uff4e\uff45","provider_url":"https:\/\/hide01.ir","title":"\u062f\u0648\u0631\u0647 SpecterOps - Adversary Tactics: Vulnerability Research for Operators","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VDm5uPohcW\"><a href=\"https:\/\/hide01.ir\/adversary-tactics-vulnerability-research-for-operators\/\">\u062f\u0648\u0631\u0647 SpecterOps &#8211; Adversary Tactics: Vulnerability Research for Operators<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hide01.ir\/adversary-tactics-vulnerability-research-for-operators\/embed\/#?secret=VDm5uPohcW\" width=\"600\" height=\"338\" title=\"&#8220;\u062f\u0648\u0631\u0647 SpecterOps &#8211; Adversary Tactics: Vulnerability Research for Operators&#8221; &#8212; \uff28\uff49\uff44\uff45\uff3a\uff45\uff52\uff4f\uff2f\uff4e\uff45\" data-secret=\"VDm5uPohcW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/hide01.ir\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/hide01.ir\/wp-content\/uploads\/2024\/05\/SPOVulnerability.jpg","thumbnail_width":1600,"thumbnail_height":800,"description":"In Adversary Tactics: Vulnerability Research for Operators, you will learn an operator-focused approach to find the vulnerabilities needed to escalate privileges, execute arbitrary code, or facilitate lateral movement in Windows environments. We will give you the methodology and identify tools to find these weaknesses during active operations, when costly lead time and dedicated lab environments [&hellip;]"}