<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://thedefensedude.com/about/</loc><lastmod>2024-05-08T01:02:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thedefensedude.com/threats-%d1%8f-us/</loc><lastmod>2024-05-06T22:33:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thedefensedude.com/2016/09/28/active-directory-risk-auditing-with-bloodhound/</loc><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/687474703a2f2f692e696d6775722e636f6d2f5365336175484e2e706e67.png</image:loc><image:title>687474703a2f2f692e696d6775722e636f6d2f5365336175484e2e706e67</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/blood-6.png</image:loc><image:title>blood-6</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/blood-5.png</image:loc><image:title>blood-5</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/blood-4.png</image:loc><image:title>blood-4</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/blood-3.png</image:loc><image:title>blood-3</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/blood-2.jpg</image:loc><image:title>blood-2</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/blood-1.jpg</image:loc><image:title>blood-1</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/cmd-4.png</image:loc><image:title>cmd-4</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/cmd-3.png</image:loc><image:title>cmd-3</image:title></image:image><image:image><image:loc>https://thedefensedude.com/wp-content/uploads/2016/09/cmd-2.png</image:loc><image:title>cmd-2</image:title></image:image><lastmod>2018-09-11T15:40:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thedefensedude.com/2016/07/19/mitigations-for-lsa-credential-exposure-part-1-plain-text-passwords/</loc><lastmod>2017-09-23T05:55:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thedefensedude.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-05-08T01:02:06+00:00</lastmod></url></urlset>
