<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://explainthehack.com</loc>
<priority>1</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons</loc>
<priority>0.9</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths</loc>
<priority>0.9</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks</loc>
<priority>0.9</priority>
</url>
<url>
<loc>https://explainthehack.com/get-started</loc>
<priority>0.7</priority>
</url>
<url>
<loc>https://explainthehack.com/pricing</loc>
<priority>0.7</priority>
</url>
<url>
<loc>https://explainthehack.com/support</loc>
<priority>0.3</priority>
</url>
<url>
<loc>https://explainthehack.com/privacy</loc>
<priority>0.2</priority>
</url>
<url>
<loc>https://explainthehack.com/terms</loc>
<priority>0.2</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/ad-structure</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/kerberos-authentication</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/ntlm-authentication</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/access-control-lists</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/group-policy-objects</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/domain-trusts</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/identifying-privilege-paths-bloodhound</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/enumerating-password-policy</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/enumerating-privileged-groups</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/identifying-kerberoastable-service-accounts</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/kerberoasting</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/as-rep-roasting</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/pass-the-hash</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/password-spraying</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/extracting-credentials-lsass</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/pass-the-ticket</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/lateral-movement-winrm</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/ntlm-relay-attacks</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/abusing-acl-permissions</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/abusing-group-policy-objects</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/shadow-credentials</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/abusing-unconstrained-delegation</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/abusing-constrained-delegation</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/dcsync</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/writing-professional-security-reports</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/interviewing-for-offensive-security-roles</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/taking-notes-during-engagements</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/explaining-business-impact-to-stakeholders</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/organizing-evidence-for-reporting</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/maintaining-a-work-vm</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/handling-ssh-keys-securely</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/preserving-access-during-authorized-testing</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/writing-professional-security-emails</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/building-practice-labs-with-ludus</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/using-proxmox-for-security-practice-labs</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/staying-current-on-vulnerabilities</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/maintaining-a-daily-work-log</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/active-directory-certificate-services</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/certificate-templates-and-enrollment-rights</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/certificate-based-authentication</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/abusing-misconfigured-certificate-templates</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/abusing-certificate-template-permissions</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/relaying-ntlm-to-adcs-web-enrollment</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/lessons/forging-golden-certificates</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/password-spray-campaign</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/kerberoasting-service-accounts</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/ntlm-relay-to-domain-compromise</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/acl-abuse-chain</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/gpo-takeover</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/unconstrained-delegation-abuse</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/certificate-template-abuse</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/ntlm-relay-to-adcs</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/attack-paths/certificate-template-permission-takeover</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/active-directory-foundations</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/discovery-and-enumeration</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/kerberos-and-ticket-based-attacks</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/ntlm-and-credential-reuse</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/permission-and-policy-abuse</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/engagement-workflow</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/communication-and-deliverables</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/growth-and-practice</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/adcs-foundations</loc>
<priority>0.8</priority>
</url>
<url>
<loc>https://explainthehack.com/tracks/adcs-abuse</loc>
<priority>0.8</priority>
</url>
</urlset>
