<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/1.-enumeration/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/</loc><lastmod>2024-04-28T10:52:01+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/5.-post-exploitation/impact/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/2.-vulnerability-scanning/nessus/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/2.-active/</loc><lastmod>2024-04-28T10:54:11+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/2.-vulnerability-scanning/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/2.-web-attacks/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/3.-attacking-login-portals/activedirectory/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/5.-post-exploitation/domainjoin/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/2.-web-attacks/vulnservices/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/1.-enumeration/network/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/2.-active/portscan/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/scope/</loc><lastmod>2024-04-28T13:04:05+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/3.-attacking-login-portals/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/1.-enumeration/applayer/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/2.-web-attacks/access/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/2.-active/directory/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/5.-post-exploitation/exportgal/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/osint/</loc><lastmod>2024-04-28T12:29:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/3.-attacking-login-portals/other/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/4.-vulnerability-exploitation/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/1.-enumeration/appfunc/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/2.-web-attacks/xss/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/2.-active/logins/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/webtech/</loc><lastmod>2024-04-28T12:08:02+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/5.-post-exploitation/</loc><lastmod>2024-04-28T06:15:48+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/2.-web-attacks/fileup/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/subdomain/</loc><lastmod>2024-04-28T13:04:05+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/2.-active/user-enum/</loc><lastmod>2024-04-28T13:28:58+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/creds/</loc><lastmod>2024-04-28T13:04:05+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/2.-web-attacks/cors/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/usernames/</loc><lastmod>2024-04-28T13:00:30+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/2.-web-attacks/csvinj/</loc><lastmod>2024-05-01T10:51:08+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/files/</loc><lastmod>2024-04-28T13:04:05+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/typo/</loc><lastmod>2024-04-28T13:04:05+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/cloud/</loc><lastmod>2024-04-28T13:04:05+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/1.-enumeration/1.-passive/code/</loc><lastmod>2024-04-28T12:42:11+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/blackhat-doxing-youtube-2025/</loc><lastmod>2025-03-24T13:44:18+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/man-in-the-middle-2025/</loc><lastmod>2025-03-24T13:33:39+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/ismg-2024/</loc><lastmod>2024-09-19T02:27:04+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/the-register-2024/</loc><lastmod>2024-09-19T02:16:01+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2024-08-08-blackhat-doxing-to-doorstep/</loc><lastmod>2024-08-08T07:00:53-07:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/doxbin/</loc><lastmod>2024-08-08T07:00:53-07:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/doxing/</loc><lastmod>2024-08-08T07:00:53-07:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/extortion/</loc><lastmod>2024-08-08T07:00:53-07:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/wired-2024/</loc><lastmod>2024-09-19T02:24:09+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tags/</loc><lastmod>2024-08-08T07:00:53-07:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/threat-research/</loc><lastmod>2024-08-08T07:00:53-07:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/vile/</loc><lastmod>2024-08-08T07:00:53-07:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/doxing-2024/</loc><lastmod>2024-09-19T02:11:53+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2024-08-07-blackhat-interviews-extorters/</loc><lastmod>2024-07-22T10:45:58+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2024-05-20-crabby-credential-stuffing-australia-account-takeovers/</loc><lastmod>2024-07-13T08:48:04+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/crabby-2024/</loc><lastmod>2024-05-20T12:58:50+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/credential-stuffing/</loc><lastmod>2024-07-13T08:48:04+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/cyber-threat-intelligence/</loc><lastmod>2024-07-13T08:48:04+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/offensive-security/</loc><lastmod>2024-07-13T08:48:04+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/career-advice/</loc><lastmod>2024-05-08T10:37:22+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2024-05-02-cyber-security-career-progression/</loc><lastmod>2024-05-08T10:37:22+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/security-leadership/</loc><lastmod>2024-05-08T10:37:22+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/</loc><lastmod>2025-03-24T14:04:55+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/hardly-adequate-2024/</loc><lastmod>2024-04-23T15:00:38+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/oscp/</loc><lastmod>2024-04-21T11:39:50+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2023-07-25-preparing-for-offensive-security-certified-practitioner/</loc><lastmod>2024-04-21T11:39:50+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/study-guide/</loc><lastmod>2024-04-21T11:39:50+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/burp-suite-certified-practitioner/</loc><lastmod>2024-04-21T13:31:11+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/career-development/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/mentorship/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2023-07-24-study-exam-guide-burp-suite-certified-practitioner/</loc><lastmod>2024-04-21T13:31:11+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2023-07-21-incident-response-tabletop-exercise/</loc><lastmod>2024-04-23T16:30:29+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/conference-presentation/</loc><lastmod>2024-04-28T04:59:02+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/incident-response/</loc><lastmod>2024-04-23T16:30:29+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/tabletop-exercise/</loc><lastmod>2024-04-23T16:30:29+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/aisa-cybercon-2023/</loc><lastmod>2024-04-23T16:48:39+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/podcast-andy-li-2022/</loc><lastmod>2024-04-23T15:00:38+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/aisa-cybertoday-2021/</loc><lastmod>2024-04-23T15:14:54+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2022-02-22-how-to-get-first-role-in-cyber-security-guide-for-students/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/employment-advice/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/bsides-perth/</loc><lastmod>2024-04-28T04:59:02+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/ethereum/</loc><lastmod>2024-04-28T04:59:02+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2021-11-27-reentrancy-attacks-ethereum/</loc><lastmod>2024-04-28T04:59:02+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/reentrancy-attacks/</loc><lastmod>2024-04-28T04:59:02+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/bsidesper-2021/</loc><lastmod>2024-04-23T16:48:39+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2021-08-14-building-cyber-resilient-future/</loc><lastmod>2024-04-23T15:19:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/future-cyber-warfighting-2021/</loc><lastmod>2024-04-23T15:27:18+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/cyber-security-education/</loc><lastmod>2024-04-23T15:19:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/cyber-warfighting/</loc><lastmod>2024-04-23T15:19:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/journal/</loc><lastmod>2024-04-23T15:19:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/cyber-security/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/sim-swapping/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/twitter-hack/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2020-07-23-twitter-hack-lessons-learned/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/cissp/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/exam-guide/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/2020-01-17-cissp-exam-guide/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/tag/isc2/</loc><lastmod>2024-04-21T13:49:35+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/about/</loc><lastmod>2025-03-24T14:11:16+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/blog/</loc><lastmod>2024-04-15T20:17:17+08:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/categories/</loc><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/contact/</loc><lastmod>2024-06-11T12:18:49+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/enpt/</loc><lastmod>2024-04-28T13:43:54+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/</loc><lastmod>2024-04-28T10:46:56+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/presentations/</loc><lastmod>2025-03-24T13:50:03+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://larsencyber.com/docs/wapt/</loc><lastmod>2024-04-28T13:44:40+00:00</lastmod><changefreq>weekly</changefreq></url></urlset>