搜索
XINTRA - Attacking and Defending Azure & M365
磁力链接/BT种子名称
XINTRA - Attacking and Defending Azure & M365
磁力链接/BT种子简介
种子哈希:
3ddab5c4e0160282bddc25e441daf2f7a15e6d86
文件大小:
5.41G
已经下载:
1887
次
下载速度:
极快
收录时间:
2023-12-25
最近下载:
2026-04-15
DMCA/投诉/Complaint:
DMCA/投诉/Complaint
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:3DDAB5C4E0160282BDDC25E441DAF2F7A15E6D86
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
快手视频
51品茶
萝莉岛APP
51动漫
91短视频
抖音Max
91porn视频
TikTok成人版
PornHub
暗网Xvideo
草榴社区
P站专业版
海角乱伦
萝莉岛
搜同
91妻友
最近搜索
奈汐酱+最新古装拾翠,超大尺度一线天鲍
undertone x265
14.0.1
gun-882
funk 005
primal
开车前
qiaoqiaots
warhammer
scream 6
ssni-043
秘2
나어때
scat impressiones
荼靡
鬼手外购
george and the dragon series
黑暗圣经 bible black 精翻汉化版
2024-12 酒店
foxit+pdf
meitin
超敏感男
fc2-ppv-3692007
kinpatu86-0068
crimson glory - chasing the hydra
rise of the beasts 2023
marchese del grillo
女人生孩
100423
217
文件列表
SOF-ELK Ingested.zip
3.0 GB
Videos/5. Reconnaissance & Enumeration/4. ATTACK - Post exploitation reconnaissance.ts
209.7 MB
Videos/7. Credential Theft/2. ATTACK - Golden SAML attack.ts
163.5 MB
Videos/2. Overview of Azure_M365/3. Overview of Azure_M365 Lecture.ts
160.3 MB
Videos/8. Lateral Movement Techniques/8. ATTACK - Abusing managed identities.ts
97.8 MB
Videos/8. Lateral Movement Techniques/2. ATTACK - Pass the PRT.ts
94.2 MB
Videos/4. Log Analysis Using SOF-ELK/2. SOF-ELK Overview and Setup.ts
91.4 MB
Videos/6. Initial Access Techniques/15. ATTACK - M365 Business email compromise.ts
85.7 MB
Videos/9. Privilege Escalation/6. ATTACK - Abusing User Administrator.ts
84.7 MB
Videos/5. Reconnaissance & Enumeration/2. ATTACK - Enumerate users and domains.ts
84.2 MB
Videos/6. Initial Access Techniques/16. DETECT - M365 Business email compromise.ts
84.0 MB
Videos/6. Initial Access Techniques/12. ATTACK - Device code authentication abuse.ts
77.4 MB
Videos/9. Privilege Escalation/3. ATTACK - Abusing Cloud Administrator.ts
72.1 MB
Videos/10. Persistence Techniques/14. ATTACK - Compromising Azure Blobs & Storage Accounts.ts
65.3 MB
Videos/7. Credential Theft/8. ATTACK - Skeleton Keys (PTA Abuse).ts
63.4 MB
Videos/10. Persistence Techniques/8. ATTACK - Service Principal Abuse.ts
61.1 MB
Videos/6. Initial Access Techniques/9. ATTACK - OAuth Abuse.ts
49.6 MB
Videos/6. Initial Access Techniques/7. DETECT - OWA Password Spraying.ts
49.5 MB
Videos/10. Persistence Techniques/2. ATTACK - AAD federated Backdoor.ts
45.5 MB
Videos/7. Credential Theft/3. DETECT - Golden SAML attack.ts
45.4 MB
Videos/6. Initial Access Techniques/13. DETECT - Device code authentication abuse.ts
45.3 MB
Videos/6. Initial Access Techniques/10. DETECT - OAuth Abuse.ts
41.2 MB
Videos/6. Initial Access Techniques/3. ATTACK - Password Spraying M365.ts
40.9 MB
Videos/10. Persistence Techniques/11. ATTACK - Automation Account Abuse.ts
39.8 MB
Videos/1. Introduction/1. Introduction.ts
37.7 MB
Videos/11. Defense Evasion/8. ATTACK - Registering Fake Agents for Log Spoofing.ts
37.0 MB
Videos/11. Defense Evasion/5. ATTACK - Spoofing Azure Sign-in Logs.ts
35.0 MB
Videos/7. Credential Theft/11. ATTACK - Stealing access tokens from Office Apps.ts
33.9 MB
Videos/7. Credential Theft/5. ATTACK - Attacking key vaults.ts
33.7 MB
Videos/10. Persistence Techniques/9. DETECT - Service Principal Abuse.ts
32.3 MB
Videos/7. Credential Theft/9. DETECT - Skeleton Keys (PTA Abuse).ts
31.0 MB
Videos/10. Persistence Techniques/12. DETECT - Automation Account Abuse.ts
30.2 MB
Videos/8. Lateral Movement Techniques/5. ATTACK - Pass the cookie.ts
29.0 MB
Videos/6. Initial Access Techniques/11. MITIGATE - OAuth Abuse.ts
28.1 MB
Videos/9. Privilege Escalation/7. DETECT - Abusing User Administrator.ts
27.5 MB
Videos/8. Lateral Movement Techniques/11. ATTACK - Virtual Machine Abuse.ts
27.3 MB
Videos/6. Initial Access Techniques/6. ATTACK - OWA Password Spraying.ts
27.1 MB
Videos/7. Credential Theft/6. DETECT - Attacking key vaults.ts
24.0 MB
Videos/5. Reconnaissance & Enumeration/5. DETECT - Post exploitation reconnaissance.ts
23.8 MB
Videos/10. Persistence Techniques/17. ATTACK - Malicious Device Join.ts
22.7 MB
Videos/8. Lateral Movement Techniques/12. DETECT - Virtual Machine Abuse.ts
22.5 MB
Videos/11. Defense Evasion/6. DETECT - Spoofing Azure Sign-in Logs.ts
21.5 MB
Videos/8. Lateral Movement Techniques/3. DETECT - Pass the PRT.ts
20.5 MB
Videos/10. Persistence Techniques/15. DETECT - Compromising Azure Blobs & Storage Accounts.ts
20.2 MB
Videos/9. Privilege Escalation/4. DETECT - Abusing Cloud Administrator.ts
19.7 MB
Videos/6. Initial Access Techniques/4. DETECT - Password Spraying M365.ts
19.1 MB
Videos/9. Privilege Escalation/2. Abusing Azure AD_RBAC roles.ts
18.2 MB
Videos/8. Lateral Movement Techniques/6. DETECT - Pass the cookie.ts
17.6 MB
Videos/8. Lateral Movement Techniques/9. DETECT - Abusing managed identities.ts
17.4 MB
Videos/7. Credential Theft/17. ATTACK - Hunting credentials in previous deployment.ts
16.1 MB
Videos/7. Credential Theft/14. ATTACK - Extract passwords from automation accounts.ts
16.0 MB
Videos/5. Reconnaissance & Enumeration/3. DETECT - Enumerate users and domains.ts
14.0 MB
Videos/3. Setting Up Your Environment/2. Setting up your own environment.ts
12.8 MB
Videos/10. Persistence Techniques/3. DETECT - AAD federated Backdoor.ts
12.3 MB
Videos/10. Persistence Techniques/5. ATTACK - Malicious MFA Takeover.ts
12.2 MB
Videos/11. Defense Evasion/2. ATTACK - Disabling Auditing.ts
11.8 MB
Videos/11. Defense Evasion/3. DETECT - Disabling Auditing.ts
11.8 MB
Videos/7. Credential Theft/12. DETECT - Stealing access tokens from Office Apps.ts
11.7 MB
Videos/7. Credential Theft/15. DETECT - Extract passwords from automation accounts.ts
11.6 MB
Videos/10. Persistence Techniques/6. DETECT - Malicious MFA Takeover.ts
10.1 MB
Videos/9. Privilege Escalation/8. MITIGATE - Abusing User Administrator.ts
8.7 MB
Videos/7. Credential Theft/4. MITIGATE - Golden SAML attack.ts
8.7 MB
Videos/10. Persistence Techniques/18. DETECT - Malicious Device Join.ts
8.7 MB
Videos/9. Privilege Escalation/5. MITIGATE - Abusing Cloud Administrator.ts
7.3 MB
Videos/6. Initial Access Techniques/17. MITIGATE - M365 Business email compromise.ts
7.1 MB
Videos/6. Initial Access Techniques/5. MITIGATE - Password Spraying M365.ts
7.1 MB
Videos/7. Credential Theft/10. MITIGATE - Skeleton Keys (PTA Abuse).ts
6.9 MB
Videos/11. Defense Evasion/9. DETECT - Registering Fake Agents for Log Spoofing.ts
6.8 MB
Videos/6. Initial Access Techniques/8. MITIGATE - OWA Password Spraying.ts
5.7 MB
Videos/8. Lateral Movement Techniques/4. MITIGATE - Pass the PRT.ts
4.8 MB
Videos/10. Persistence Techniques/7. MITIGATE - Malicious MFA Takeover.ts
4.3 MB
Videos/8. Lateral Movement Techniques/13. MITIGATE - Virtual Machine Abuse.ts
3.8 MB
Videos/2. Overview of Azure_M365/2. Updates to Microsoft Azure 2023.ts
3.7 MB
Videos/8. Lateral Movement Techniques/7. MITIGATE - Pass the cookie.ts
3.6 MB
Videos/10. Persistence Techniques/10. MITIGATE - Service Principal Abuse.ts
3.6 MB
Videos/11. Defense Evasion/10. MITIGATE - Registering Fake Agents for Log Spoofing.ts
3.5 MB
Videos/7. Credential Theft/7. MITIGATE - Attacking key vaults.ts
3.2 MB
Videos/10. Persistence Techniques/13. MITIGATE - Automation Account Abuse.ts
3.2 MB
Videos/11. Defense Evasion/7. MITIGATE - Spoofing Azure Sign-in Logs.ts
3.1 MB
Videos/7. Credential Theft/16. MITIGATE - Extract passwords from automation accounts.ts
2.8 MB
Videos/6. Initial Access Techniques/14. MITIGATE - Device code authentication abuse.ts
2.6 MB
Videos/11. Defense Evasion/4. MITIGATE - Disabling Auditing.ts
2.6 MB
Videos/7. Credential Theft/13. MITIGATE - Stealing access tokens from Office Apps.ts
2.5 MB
Videos/10. Persistence Techniques/4. MITIGATE - AAD federated Backdoor.ts
2.5 MB
Videos/8. Lateral Movement Techniques/10. MITIGATE - Abusing managed identities.ts
2.5 MB
Videos/10. Persistence Techniques/16. MITIGATE - Compromising Azure Blobs & Storage Accounts.ts
2.4 MB
Videos/10. Persistence Techniques/19. MITIGATE - Malicious Device Join.ts
2.4 MB
Videos/7. Credential Theft/18. DETECT - Hunting credentials in previous deployment.ts
2.3 MB
Videos/6. Initial Access Techniques/2. Initial_Access_Technique_Files.zip
92.6 kB
Videos/9. Privilege Escalation/Links and Resources.txt
11.6 kB
Videos/7. Credential Theft/1. Module 7 Links and Resources.txt
2.1 kB
Videos/6. Initial Access Techniques/1. Module 6 Links and Resources.txt
2.1 kB
Videos/10. Persistence Techniques/1. Module 10 Links and Resources.txt
1.8 kB
Videos/5. Reconnaissance & Enumeration/1. Module 5 Links and Resources.txt
1.2 kB
Videos/8. Lateral Movement Techniques/1. Module 8 Links and Resources.txt
1.2 kB
Videos/2. Overview of Azure_M365/1. Module 2 Links and Resources.txt
1.0 kB
Videos/4. Log Analysis Using SOF-ELK/1. Module 4 Links and Resources.txt
775 Bytes
Videos/11. Defense Evasion/1. Module 11 Links and Resources.txt
606 Bytes
Videos/3. Setting Up Your Environment/1. Module 3 Links and Resources.txt
531 Bytes
Videos/9. Privilege Escalation/1. Module 9 Links and Resources.txt
194 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!