搜索
XINTRA - Attacking and Defending Azure & M365
磁力链接/BT种子名称
XINTRA - Attacking and Defending Azure & M365
磁力链接/BT种子简介
种子哈希:
3ddab5c4e0160282bddc25e441daf2f7a15e6d86
文件大小:
5.41G
已经下载:
624
次
下载速度:
极快
收录时间:
2023-12-25
最近下载:
2024-11-14
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:3DDAB5C4E0160282BDDC25E441DAF2F7A15E6D86
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
ipzz-c
angela white 24.11.12
easygirl黑人
面镜
sex+and+death+101
yyllzy
疯子老爸
翘子
推特虐阴
小区偷窥
ras-0310
franco
bangbus.
girl 13yo
lee lee ts
美乃+破解
女同女护士
immorallive
唐朝秘史
997397
girthmasterr
supe
snis-764.
最新流出网红美少女【柚子猫】
黑色吊带长裙
爱希
wight
航空门
桑拿小弟
三人行
文件列表
SOF-ELK Ingested.zip
3.0 GB
Videos/5. Reconnaissance & Enumeration/4. ATTACK - Post exploitation reconnaissance.ts
209.7 MB
Videos/7. Credential Theft/2. ATTACK - Golden SAML attack.ts
163.5 MB
Videos/2. Overview of Azure_M365/3. Overview of Azure_M365 Lecture.ts
160.3 MB
Videos/8. Lateral Movement Techniques/8. ATTACK - Abusing managed identities.ts
97.8 MB
Videos/8. Lateral Movement Techniques/2. ATTACK - Pass the PRT.ts
94.2 MB
Videos/4. Log Analysis Using SOF-ELK/2. SOF-ELK Overview and Setup.ts
91.4 MB
Videos/6. Initial Access Techniques/15. ATTACK - M365 Business email compromise.ts
85.7 MB
Videos/9. Privilege Escalation/6. ATTACK - Abusing User Administrator.ts
84.7 MB
Videos/5. Reconnaissance & Enumeration/2. ATTACK - Enumerate users and domains.ts
84.2 MB
Videos/6. Initial Access Techniques/16. DETECT - M365 Business email compromise.ts
84.0 MB
Videos/6. Initial Access Techniques/12. ATTACK - Device code authentication abuse.ts
77.4 MB
Videos/9. Privilege Escalation/3. ATTACK - Abusing Cloud Administrator.ts
72.1 MB
Videos/10. Persistence Techniques/14. ATTACK - Compromising Azure Blobs & Storage Accounts.ts
65.3 MB
Videos/7. Credential Theft/8. ATTACK - Skeleton Keys (PTA Abuse).ts
63.4 MB
Videos/10. Persistence Techniques/8. ATTACK - Service Principal Abuse.ts
61.1 MB
Videos/6. Initial Access Techniques/9. ATTACK - OAuth Abuse.ts
49.6 MB
Videos/6. Initial Access Techniques/7. DETECT - OWA Password Spraying.ts
49.5 MB
Videos/10. Persistence Techniques/2. ATTACK - AAD federated Backdoor.ts
45.5 MB
Videos/7. Credential Theft/3. DETECT - Golden SAML attack.ts
45.4 MB
Videos/6. Initial Access Techniques/13. DETECT - Device code authentication abuse.ts
45.3 MB
Videos/6. Initial Access Techniques/10. DETECT - OAuth Abuse.ts
41.2 MB
Videos/6. Initial Access Techniques/3. ATTACK - Password Spraying M365.ts
40.9 MB
Videos/10. Persistence Techniques/11. ATTACK - Automation Account Abuse.ts
39.8 MB
Videos/1. Introduction/1. Introduction.ts
37.7 MB
Videos/11. Defense Evasion/8. ATTACK - Registering Fake Agents for Log Spoofing.ts
37.0 MB
Videos/11. Defense Evasion/5. ATTACK - Spoofing Azure Sign-in Logs.ts
35.0 MB
Videos/7. Credential Theft/11. ATTACK - Stealing access tokens from Office Apps.ts
33.9 MB
Videos/7. Credential Theft/5. ATTACK - Attacking key vaults.ts
33.7 MB
Videos/10. Persistence Techniques/9. DETECT - Service Principal Abuse.ts
32.3 MB
Videos/7. Credential Theft/9. DETECT - Skeleton Keys (PTA Abuse).ts
31.0 MB
Videos/10. Persistence Techniques/12. DETECT - Automation Account Abuse.ts
30.2 MB
Videos/8. Lateral Movement Techniques/5. ATTACK - Pass the cookie.ts
29.0 MB
Videos/6. Initial Access Techniques/11. MITIGATE - OAuth Abuse.ts
28.1 MB
Videos/9. Privilege Escalation/7. DETECT - Abusing User Administrator.ts
27.5 MB
Videos/8. Lateral Movement Techniques/11. ATTACK - Virtual Machine Abuse.ts
27.3 MB
Videos/6. Initial Access Techniques/6. ATTACK - OWA Password Spraying.ts
27.1 MB
Videos/7. Credential Theft/6. DETECT - Attacking key vaults.ts
24.0 MB
Videos/5. Reconnaissance & Enumeration/5. DETECT - Post exploitation reconnaissance.ts
23.8 MB
Videos/10. Persistence Techniques/17. ATTACK - Malicious Device Join.ts
22.7 MB
Videos/8. Lateral Movement Techniques/12. DETECT - Virtual Machine Abuse.ts
22.5 MB
Videos/11. Defense Evasion/6. DETECT - Spoofing Azure Sign-in Logs.ts
21.5 MB
Videos/8. Lateral Movement Techniques/3. DETECT - Pass the PRT.ts
20.5 MB
Videos/10. Persistence Techniques/15. DETECT - Compromising Azure Blobs & Storage Accounts.ts
20.2 MB
Videos/9. Privilege Escalation/4. DETECT - Abusing Cloud Administrator.ts
19.7 MB
Videos/6. Initial Access Techniques/4. DETECT - Password Spraying M365.ts
19.1 MB
Videos/9. Privilege Escalation/2. Abusing Azure AD_RBAC roles.ts
18.2 MB
Videos/8. Lateral Movement Techniques/6. DETECT - Pass the cookie.ts
17.6 MB
Videos/8. Lateral Movement Techniques/9. DETECT - Abusing managed identities.ts
17.4 MB
Videos/7. Credential Theft/17. ATTACK - Hunting credentials in previous deployment.ts
16.1 MB
Videos/7. Credential Theft/14. ATTACK - Extract passwords from automation accounts.ts
16.0 MB
Videos/5. Reconnaissance & Enumeration/3. DETECT - Enumerate users and domains.ts
14.0 MB
Videos/3. Setting Up Your Environment/2. Setting up your own environment.ts
12.8 MB
Videos/10. Persistence Techniques/3. DETECT - AAD federated Backdoor.ts
12.3 MB
Videos/10. Persistence Techniques/5. ATTACK - Malicious MFA Takeover.ts
12.2 MB
Videos/11. Defense Evasion/2. ATTACK - Disabling Auditing.ts
11.8 MB
Videos/11. Defense Evasion/3. DETECT - Disabling Auditing.ts
11.8 MB
Videos/7. Credential Theft/12. DETECT - Stealing access tokens from Office Apps.ts
11.7 MB
Videos/7. Credential Theft/15. DETECT - Extract passwords from automation accounts.ts
11.6 MB
Videos/10. Persistence Techniques/6. DETECT - Malicious MFA Takeover.ts
10.1 MB
Videos/9. Privilege Escalation/8. MITIGATE - Abusing User Administrator.ts
8.7 MB
Videos/7. Credential Theft/4. MITIGATE - Golden SAML attack.ts
8.7 MB
Videos/10. Persistence Techniques/18. DETECT - Malicious Device Join.ts
8.7 MB
Videos/9. Privilege Escalation/5. MITIGATE - Abusing Cloud Administrator.ts
7.3 MB
Videos/6. Initial Access Techniques/17. MITIGATE - M365 Business email compromise.ts
7.1 MB
Videos/6. Initial Access Techniques/5. MITIGATE - Password Spraying M365.ts
7.1 MB
Videos/7. Credential Theft/10. MITIGATE - Skeleton Keys (PTA Abuse).ts
6.9 MB
Videos/11. Defense Evasion/9. DETECT - Registering Fake Agents for Log Spoofing.ts
6.8 MB
Videos/6. Initial Access Techniques/8. MITIGATE - OWA Password Spraying.ts
5.7 MB
Videos/8. Lateral Movement Techniques/4. MITIGATE - Pass the PRT.ts
4.8 MB
Videos/10. Persistence Techniques/7. MITIGATE - Malicious MFA Takeover.ts
4.3 MB
Videos/8. Lateral Movement Techniques/13. MITIGATE - Virtual Machine Abuse.ts
3.8 MB
Videos/2. Overview of Azure_M365/2. Updates to Microsoft Azure 2023.ts
3.7 MB
Videos/8. Lateral Movement Techniques/7. MITIGATE - Pass the cookie.ts
3.6 MB
Videos/10. Persistence Techniques/10. MITIGATE - Service Principal Abuse.ts
3.6 MB
Videos/11. Defense Evasion/10. MITIGATE - Registering Fake Agents for Log Spoofing.ts
3.5 MB
Videos/7. Credential Theft/7. MITIGATE - Attacking key vaults.ts
3.2 MB
Videos/10. Persistence Techniques/13. MITIGATE - Automation Account Abuse.ts
3.2 MB
Videos/11. Defense Evasion/7. MITIGATE - Spoofing Azure Sign-in Logs.ts
3.1 MB
Videos/7. Credential Theft/16. MITIGATE - Extract passwords from automation accounts.ts
2.8 MB
Videos/6. Initial Access Techniques/14. MITIGATE - Device code authentication abuse.ts
2.6 MB
Videos/11. Defense Evasion/4. MITIGATE - Disabling Auditing.ts
2.6 MB
Videos/7. Credential Theft/13. MITIGATE - Stealing access tokens from Office Apps.ts
2.5 MB
Videos/10. Persistence Techniques/4. MITIGATE - AAD federated Backdoor.ts
2.5 MB
Videos/8. Lateral Movement Techniques/10. MITIGATE - Abusing managed identities.ts
2.5 MB
Videos/10. Persistence Techniques/16. MITIGATE - Compromising Azure Blobs & Storage Accounts.ts
2.4 MB
Videos/10. Persistence Techniques/19. MITIGATE - Malicious Device Join.ts
2.4 MB
Videos/7. Credential Theft/18. DETECT - Hunting credentials in previous deployment.ts
2.3 MB
Videos/6. Initial Access Techniques/2. Initial_Access_Technique_Files.zip
92.6 kB
Videos/9. Privilege Escalation/Links and Resources.txt
11.6 kB
Videos/7. Credential Theft/1. Module 7 Links and Resources.txt
2.1 kB
Videos/6. Initial Access Techniques/1. Module 6 Links and Resources.txt
2.1 kB
Videos/10. Persistence Techniques/1. Module 10 Links and Resources.txt
1.8 kB
Videos/5. Reconnaissance & Enumeration/1. Module 5 Links and Resources.txt
1.2 kB
Videos/8. Lateral Movement Techniques/1. Module 8 Links and Resources.txt
1.2 kB
Videos/2. Overview of Azure_M365/1. Module 2 Links and Resources.txt
1.0 kB
Videos/4. Log Analysis Using SOF-ELK/1. Module 4 Links and Resources.txt
775 Bytes
Videos/11. Defense Evasion/1. Module 11 Links and Resources.txt
606 Bytes
Videos/3. Setting Up Your Environment/1. Module 3 Links and Resources.txt
531 Bytes
Videos/9. Privilege Escalation/1. Module 9 Links and Resources.txt
194 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>