XINTRA - Attacking and Defending Azure & M365

磁链地址复制复制磁链成功
磁链详情
文件数目:100个文件
文件大小:5.41 GB
收录时间:2023-12-26
访问次数:3
相关内容:XINTRAAttackingDefendingAzureM365
文件meta
  • SOF-ELK Ingested.zip
    2.82 GB
  • Videos/5. Reconnaissance & Enumeration/4. ATTACK - Post exploitation reconnaissance.ts
    199.99 MB
  • Videos/7. Credential Theft/2. ATTACK - Golden SAML attack.ts
    155.95 MB
  • Videos/2. Overview of Azure_M365/3. Overview of Azure_M365 Lecture.ts
    152.84 MB
  • Videos/8. Lateral Movement Techniques/8. ATTACK - Abusing managed identities.ts
    93.24 MB
  • Videos/8. Lateral Movement Techniques/2. ATTACK - Pass the PRT.ts
    89.87 MB
  • Videos/4. Log Analysis Using SOF-ELK/2. SOF-ELK Overview and Setup.ts
    87.14 MB
  • Videos/6. Initial Access Techniques/15. ATTACK - M365 Business email compromise.ts
    81.71 MB
  • Videos/9. Privilege Escalation/6. ATTACK - Abusing User Administrator.ts
    80.75 MB
  • Videos/5. Reconnaissance & Enumeration/2. ATTACK - Enumerate users and domains.ts
    80.29 MB
  • Videos/6. Initial Access Techniques/16. DETECT - M365 Business email compromise.ts
    80.08 MB
  • Videos/6. Initial Access Techniques/12. ATTACK - Device code authentication abuse.ts
    73.78 MB
  • Videos/9. Privilege Escalation/3. ATTACK - Abusing Cloud Administrator.ts
    68.76 MB
  • Videos/10. Persistence Techniques/14. ATTACK - Compromising Azure Blobs & Storage Accounts.ts
    62.23 MB
  • Videos/7. Credential Theft/8. ATTACK - Skeleton Keys (PTA Abuse).ts
    60.44 MB
  • Videos/10. Persistence Techniques/8. ATTACK - Service Principal Abuse.ts
    58.27 MB
  • Videos/6. Initial Access Techniques/9. ATTACK - OAuth Abuse.ts
    47.32 MB
  • Videos/6. Initial Access Techniques/7. DETECT - OWA Password Spraying.ts
    47.24 MB
  • Videos/10. Persistence Techniques/2. ATTACK - AAD federated Backdoor.ts
    43.39 MB
  • Videos/7. Credential Theft/3. DETECT - Golden SAML attack.ts
    43.32 MB
  • Videos/6. Initial Access Techniques/13. DETECT - Device code authentication abuse.ts
    43.2 MB
  • Videos/6. Initial Access Techniques/10. DETECT - OAuth Abuse.ts
    39.25 MB
  • Videos/6. Initial Access Techniques/3. ATTACK - Password Spraying M365.ts
    39.01 MB
  • Videos/10. Persistence Techniques/11. ATTACK - Automation Account Abuse.ts
    37.98 MB
  • Videos/1. Introduction/1. Introduction.ts
    35.95 MB
  • Videos/11. Defense Evasion/8. ATTACK - Registering Fake Agents for Log Spoofing.ts
    35.29 MB
  • Videos/11. Defense Evasion/5. ATTACK - Spoofing Azure Sign-in Logs.ts
    33.33 MB
  • Videos/7. Credential Theft/11. ATTACK - Stealing access tokens from Office Apps.ts
    32.33 MB
  • Videos/7. Credential Theft/5. ATTACK - Attacking key vaults.ts
    32.18 MB
  • Videos/10. Persistence Techniques/9. DETECT - Service Principal Abuse.ts
    30.83 MB
  • Videos/7. Credential Theft/9. DETECT - Skeleton Keys (PTA Abuse).ts
    29.54 MB
  • Videos/10. Persistence Techniques/12. DETECT - Automation Account Abuse.ts
    28.79 MB
  • Videos/8. Lateral Movement Techniques/5. ATTACK - Pass the cookie.ts
    27.64 MB
  • Videos/6. Initial Access Techniques/11. MITIGATE - OAuth Abuse.ts
    26.83 MB
  • Videos/9. Privilege Escalation/7. DETECT - Abusing User Administrator.ts
    26.22 MB
  • Videos/8. Lateral Movement Techniques/11. ATTACK - Virtual Machine Abuse.ts
    26 MB
  • Videos/6. Initial Access Techniques/6. ATTACK - OWA Password Spraying.ts
    25.85 MB
  • Videos/7. Credential Theft/6. DETECT - Attacking key vaults.ts
    22.86 MB
  • Videos/5. Reconnaissance & Enumeration/5. DETECT - Post exploitation reconnaissance.ts
    22.67 MB
  • Videos/10. Persistence Techniques/17. ATTACK - Malicious Device Join.ts
    21.63 MB
  • Videos/8. Lateral Movement Techniques/12. DETECT - Virtual Machine Abuse.ts
    21.45 MB
  • Videos/11. Defense Evasion/6. DETECT - Spoofing Azure Sign-in Logs.ts
    20.54 MB
  • Videos/8. Lateral Movement Techniques/3. DETECT - Pass the PRT.ts
    19.57 MB
  • Videos/10. Persistence Techniques/15. DETECT - Compromising Azure Blobs & Storage Accounts.ts
    19.29 MB
  • Videos/9. Privilege Escalation/4. DETECT - Abusing Cloud Administrator.ts
    18.75 MB
  • Videos/6. Initial Access Techniques/4. DETECT - Password Spraying M365.ts
    18.17 MB
  • Videos/9. Privilege Escalation/2. Abusing Azure AD_RBAC roles.ts
    17.4 MB
  • Videos/8. Lateral Movement Techniques/6. DETECT - Pass the cookie.ts
    16.74 MB
  • Videos/8. Lateral Movement Techniques/9. DETECT - Abusing managed identities.ts
    16.63 MB
  • Videos/7. Credential Theft/17. ATTACK - Hunting credentials in previous deployment.ts
    15.31 MB
©2018 cilimao.app 磁力猫 v3.0
使用必读|联系我们|地址发布|种子提交