<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://nishacloud.com/</loc></url><url><loc>https://nishacloud.com/about/</loc></url><url><loc>https://nishacloud.com/blog/</loc></url><url><loc>https://nishacloud.com/blog/2022-09-11-vnet-to-vnet-connections-in-azure/</loc></url><url><loc>https://nishacloud.com/blog/2022-09-16-creating-azure-point-to-site-vpn-connections/</loc></url><url><loc>https://nishacloud.com/blog/2022-10-16-create-a-site-to-site-s2s-vpn-connection-in-azure/</loc></url><url><loc>https://nishacloud.com/blog/2022-10-26-traffic-routing-in-microsoft-azure-with-subnet-to-network-virtual-appliance-nva/</loc></url><url><loc>https://nishacloud.com/blog/2022-10-31-configure-azure-load-balancer/</loc></url><url><loc>https://nishacloud.com/blog/2022-11-07-creating-inbound-nat-rules-to-connect-to-a-single-vm-in-azure-port-forwarding/</loc></url><url><loc>https://nishacloud.com/blog/2022-11-13-deploy-azure-application-gateway-to-direct-web-traffic/</loc></url><url><loc>https://nishacloud.com/blog/2022-12-04-deploy-configure-azure-firewall/</loc></url><url><loc>https://nishacloud.com/blog/2023-01-13-enable-session-stickiness-using-an-application-load-balancer-in-aws-alb/</loc></url><url><loc>https://nishacloud.com/blog/2023-01-16-deploy-amazon-connect-contact-center/</loc></url><url><loc>https://nishacloud.com/blog/2023-01-19-how-to-deploy-a-secured-static-website-on-aws/</loc></url><url><loc>https://nishacloud.com/blog/2023-01-24-troubleshooting-iam-access-issues-in-aws/</loc></url><url><loc>https://nishacloud.com/blog/2023-03-29-aws-networking-multi-vpc-architecture/</loc></url><url><loc>https://nishacloud.com/blog/2023-04-03-enable-inter-vpc-connectivity-using-peering-connections-in-aws/</loc></url><url><loc>https://nishacloud.com/blog/2023-04-16-enable-inter-vpc-connectivity-with-aws-transit-gateway/</loc></url><url><loc>https://nishacloud.com/blog/2023-04-17-configure-network-monitoring-in-aws/</loc></url><url><loc>https://nishacloud.com/blog/2023-04-17-implement-security-controls-in-aws/</loc></url><url><loc>https://nishacloud.com/blog/2023-05-01-windows-fundamemtals-1-thm/</loc></url><url><loc>https://nishacloud.com/blog/2023-05-03-intro-to-defensive-security/</loc></url><url><loc>https://nishacloud.com/blog/2023-07-13-vulnerability-scanning-with-openvas-unveiling-cybersecurity-insights/</loc></url><url><loc>https://nishacloud.com/blog/2023-07-15-splunk-basics-thm-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2023-07-22-incident-handling-with-splunk-thm-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2023-08-01-create-virtual-networks-in-azure/</loc></url><url><loc>https://nishacloud.com/blog/2023-08-01-identity-and-access-management-azure-policy/</loc></url><url><loc>https://nishacloud.com/blog/2023-08-01-identity-and-access-management-resource-manager-locks-in-azure/</loc></url><url><loc>https://nishacloud.com/blog/2023-08-01-identity-and-access-management-role-based-access-control/</loc></url><url><loc>https://nishacloud.com/blog/2023-08-03-configure-dns-settings-in-azure/</loc></url><url><loc>https://nishacloud.com/blog/2023-08-06-vulnerability-scanning-with-nmap-network-scanning/</loc></url><url><loc>https://nishacloud.com/blog/2023-09-16-configuring-dmz-with-palo-alto-firewall/</loc></url><url><loc>https://nishacloud.com/blog/2023-09-17-vulnerability-scanning-nessus/</loc></url><url><loc>https://nishacloud.com/blog/2023-09-18-intro-to-offensive-security-thm-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2023-09-19-the-art-of-reconnaissance-in-cybersecurity/</loc></url><url><loc>https://nishacloud.com/blog/2023-09-27-walking-an-application-thm-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2023-09-28-meow-htb-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2023-10-13-content-discovery-thm-walkthough/</loc></url><url><loc>https://nishacloud.com/blog/2023-11-19-linux-fundamentals-1-thm/</loc></url><url><loc>https://nishacloud.com/blog/2023-12-05-wireshark-basics/</loc></url><url><loc>https://nishacloud.com/blog/2023-12-23-rootme-thm/</loc></url><url><loc>https://nishacloud.com/blog/2023-12-24-windows-event-logs-thm/</loc></url><url><loc>https://nishacloud.com/blog/2024-01-09-intro-aws-identity-and-access-management/</loc></url><url><loc>https://nishacloud.com/blog/2024-01-09-network-services-thm/</loc></url><url><loc>https://nishacloud.com/blog/2024-02-15-post-exploitation-basics-thm-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2024-03-18-exploiting-eternal-blue-walkthrough-protection/</loc></url><url><loc>https://nishacloud.com/blog/2024-03-19-rooting-the-academy-box-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2024-04-14-how-to-install-remmina-on-kali-linux/</loc></url><url><loc>https://nishacloud.com/blog/2024-06-04-ice-tryhackme-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2024-06-14-hacking-kenobi-tryhackme/</loc></url><url><loc>https://nishacloud.com/blog/2024-06-16-steel-mountain-thm-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2024-06-29-idor-thm/</loc></url><url><loc>https://nishacloud.com/blog/2024-07-02-ignite-tryhackme-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2024-07-05-dancing-htb-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2024-07-15-ejpt-certification-journey/</loc></url><url><loc>https://nishacloud.com/blog/2024-07-21-understanding-llmnr-poisoning-attacks/</loc></url><url><loc>https://nishacloud.com/blog/2024-07-22-understanding-smb-relay-attacks-and-mitigation-techniques/</loc></url><url><loc>https://nishacloud.com/blog/2024-07-26-ad-attack-ipv6-dns-takeover-via-mitm6/</loc></url><url><loc>https://nishacloud.com/blog/2024-07-28-passback-attacks/</loc></url><url><loc>https://nishacloud.com/blog/2024-10-11-escalate-and-defend-linux-kernel-exploit/</loc></url><url><loc>https://nishacloud.com/blog/2024-10-13-splunk-data-administration-parsing-phase/</loc></url><url><loc>https://nishacloud.com/blog/2024-10-16-investigate-web-attacks-lets-defend-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2024-11-21-enumeration-brute-force-tryhackme/</loc></url><url><loc>https://nishacloud.com/blog/2024-12-07-devbox-pnpt-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2025-03-03-anonymous-rooted/</loc></url><url><loc>https://nishacloud.com/blog/2025-03-27-lazyadmin-tryhackme-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2025-04-22-devel-rooted-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2025-05-06-alwaysinstallelevated-walkthrough/</loc></url><url><loc>https://nishacloud.com/blog/2026-01-01-secure-secret-retrieval-in-aws-lambda/</loc></url><url><loc>https://nishacloud.com/tools/</loc></url><url><loc>https://nishacloud.com/tools/aws-security-checklist/</loc></url></urlset>