<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://ninjasta.it/2025/07/14/the-ghosts-of-exchange-hidden-permissions-lurking-in-active-directory/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/07/file_00000000f9686243ac8c18bc7bd0f051.png</image:loc><image:title>file_00000000f9686243ac8c18bc7bd0f051</image:title></image:image><lastmod>2026-01-15T22:10:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2026/01/03/ai-from-think-different-to-think-probable/</loc><lastmod>2026-01-15T19:44:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/11/10/osint-the-art-of-discovering-everything-about-anyone-legally/</loc><lastmod>2026-01-15T19:25:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/11/09/social-engineering-how-hackers-trick-you-without-touching-a-line-of-code/</loc><lastmod>2026-01-13T21:21:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/security-techniques/</loc><lastmod>2026-01-13T21:01:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ninjasta.it/best5/</loc><lastmod>2026-01-13T21:01:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ninjasta.it/automation/</loc><lastmod>2026-01-13T21:00:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ninjasta.it/perspectives/</loc><lastmod>2026-01-13T21:00:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ninjasta.it/latest/</loc><lastmod>2026-01-13T20:59:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ninjasta.it/identity/</loc><lastmod>2026-01-13T20:58:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ninjasta.it/posts/</loc><lastmod>2026-01-13T20:58:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ninjasta.it/me/</loc><lastmod>2026-01-12T21:13:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ninjasta.it/2023/02/20/windows-laps-transition-from-legacy-to-modern-password-management/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2023/02/create-a-highly-detailed-high-resolution-featured-image-that-visually-represents-1.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-that-visually-represents</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2023/02/create-a-highly-detailed-high-resolution-featured-image-that-visually-represents.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-that-visually-represents</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2023/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:16:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2023/04/19/microsoft-booking/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2023/04/create-an-image-illustrating-the-concept-of-using-microsoft-booking.png</image:loc><image:title>create-an-image-illustrating-the-concept-of-using-microsoft-booking</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2023/04/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-23.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-22.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-21.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-20.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2024/09/30/1614/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2024/09/create-a-highly-detailed-and-sharp-focused-image-depicting-a-visually.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-image-depicting-a-visually</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-18.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-16.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-12.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:15:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/02/12/remediate-the-vulnerability-cve-2023-24932/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/create-a-high-resolution-highly-detailed-image-depicting-a-device-interface.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-depicting-a-device-interface</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-24-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:15:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/02/24/migrating-your-windows-device-from-active-directory-to-entra-id/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/02/image-30.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/03/03/step-by-step-c-powershell-module-creation-in-visual-code/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/03/14/windows-domain-name-service-remote-code-execution-vulnerability-cve-2025-24064/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/03/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:14:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/03/30/account-manipulation-how-attackers-stay-inside-your-systems/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/03/0143269d-3e08-4cc7-9f9a-f529e36e8d17.png</image:loc><image:title>0143269d-3e08-4cc7-9f9a-f529e36e8d17</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/03/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:14:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/04/07/tiering-in-active-directory-effective-strategy-to-increase-security-and-resiliency/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/generate-a-highly-detailed-high-resolution-image-depicting-the-concept-of.png</image:loc><image:title>generate-a-highly-detailed-high-resolution-image-depicting-the-concept-of</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/picture2-1.png</image:loc><image:title>Picture2</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/picture2.png</image:loc><image:title>Picture2</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/picture1.png</image:loc><image:title>Picture1</image:title></image:image><lastmod>2026-01-12T18:13:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/04/11/pass-the-hash-pth-attack-technique-and-complete-defenses/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/create-a-detailed-and-informative-blog-post-image-that-visually-1.png</image:loc><image:title>create-a-detailed-and-informative-blog-post-image-that-visually</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/create-a-detailed-and-informative-blog-post-image-that-visually.png</image:loc><image:title>create-a-detailed-and-informative-blog-post-image-that-visually</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-12T18:13:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/04/17/quantum-computing-and-cybersecurity-how-companies-can-prepare-for-the-quantum-wave/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/file_000000007e70620a99f8d80250021ebe_conversation_id3d67ff3c2c-c788-8012-9642-008c82ee687a26message_id3deb6e35a9-2205-43f6-b820-6bd06af39280.png</image:loc><image:title>file_000000007e70620a99f8d80250021ebe_conversation_id=67ff3c2c-c788-8012-9642-008c82ee687a&amp;message_id=eb6e35a9-2205-43f6-b820-6bd06af39280</image:title></image:image><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/file_000000007e70620a99f8d80250021ebe_conversation_id3d67ff3c2c-c788-8012-9642-008c82ee687a26message_id3deb6e35a9-2205-43f6-b820-6bd06af3928038346243327896584.jpg</image:loc><image:title>file_000000007e70620a99f8d80250021ebe_conversation_id=67ff3c2c-c788-8012-9642-008c82ee687a&amp;message_id=eb6e35a9-2205-43f6-b820-6bd06af3928038346243327896584.</image:title></image:image><lastmod>2026-01-12T18:12:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/04/17/all-in-on-cloud-yes-but-with-your-feet-on-the-ground/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/04/1000020433.png</image:loc><image:title>1000020433</image:title></image:image><lastmod>2026-01-12T18:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/05/14/kerberoasting-how-it-works-how-to-defend-and-how-to-minimize-the-damage/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/05/dad8fab9-65e5-4946-9c5c-c3de95bc9d03.png</image:loc><image:title>dad8fab9-65e5-4946-9c5c-c3de95bc9d03</image:title></image:image><lastmod>2026-01-12T18:11:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/06/25/shadow-admins-in-active-directory-the-privilege-you-dont-see-until-its-too-late/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/06/file_000000009ba8620aabd60b864209254c.png</image:loc><image:title>file_000000009ba8620aabd60b864209254c</image:title></image:image><lastmod>2026-01-12T18:10:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it/2025/07/03/lateral-movement-in-azure-ad-what-still-works-in-2025/</loc><image:image><image:loc>https://ninjasta.it/wp-content/uploads/2025/07/file_0000000067c06246abd9f720976cb805.png</image:loc><image:title>file_0000000067c06246abd9f720976cb805</image:title></image:image><lastmod>2026-01-12T18:09:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ninjasta.it</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-01-15T22:10:36+00:00</lastmod></url></urlset>
