SEC699 Advanced Purple Team Tactics |
||
Name |
DOWNLOAD Copy Link | |
Total Size |
6.9 GB |
|
Total Files |
786 |
|
Last Seen |
2024-07-23 00:35 |
|
Hash |
C8195C11E8337995C536343B8DBE7DBA66432743 |
/PDF 2021/ |
|
|
16.6 MB |
|
11.8 MB |
|
17.3 MB |
|
15.1 MB |
|
8.5 MB |
|
4.9 MB |
|
74.8 MB |
|
80.9 MB |
/USB 2021/ |
|
|
4.5 GB |
|
0.2 KB |
|
8.5 KB |
/.../1. Adversary Emulation for Breach Prevention Detection/1. Course objectives/ |
|
|
16.4 MB |
|
26.3 MB |
|
6.5 MB |
|
7.9 MB |
|
10.1 MB |
/.../2. Building our lab environment/ |
|
|
425.8 KB |
2. Building Our SEC699 Lab Environment Author Preparation.mp4 |
6.2 MB |
|
7.4 MB |
|
4.7 MB |
|
9.9 MB |
|
3.7 MB |
|
3.1 MB |
|
2.4 MB |
|
4.0 MB |
|
2.6 MB |
|
2.9 MB |
|
4.9 MB |
|
2.1 MB |
|
3.2 MB |
/.../3. Introducing the lab architecture/ |
|
|
579.8 KB |
|
11.2 MB |
|
4.4 MB |
|
1.6 MB |
|
4.5 MB |
|
2.5 MB |
|
21.6 MB |
|
35.0 MB |
/.../4. Purple teaming organization/ |
|
|
3.5 MB |
|
5.5 MB |
|
6.7 MB |
|
6.7 MB |
|
1.3 MB |
|
2.1 MB |
|
1.1 MB |
|
605.7 KB |
|
1.1 MB |
|
816.1 KB |
|
10.8 MB |
|
8.2 MB |
|
7.9 MB |
|
5.2 MB |
|
1.3 MB |
|
2.0 MB |
|
2.8 MB |
|
8.3 MB |
|
3.4 MB |
|
532.2 KB |
|
1.1 MB |
|
1.0 MB |
|
952.3 KB |
|
830.7 KB |
|
1.3 MB |
|
2.5 MB |
|
6.1 MB |
/.../5. Building a stack for detection/ |
|
|
6.0 MB |
|
2.0 MB |
|
3.0 MB |
|
4.7 MB |
|
1.8 MB |
|
2.7 MB |
|
1.8 MB |
|
228.1 KB |
|
3.8 MB |
|
6.2 MB |
|
4.2 MB |
|
1.8 MB |
|
5.1 MB |
|
4.0 MB |
|
947.2 KB |
|
1.4 MB |
|
1.5 MB |
|
4.6 MB |
|
1.3 MB |
|
1.7 MB |
|
560.9 KB |
|
863.9 KB |
|
838.6 KB |
|
726.5 KB |
|
4.8 MB |
/.../6. Assessing detection coverage/ |
|
|
2.5 MB |
|
5.7 MB |
|
3.3 MB |
|
2.0 MB |
|
6.4 MB |
|
3.1 MB |
|
2.9 MB |
|
2.6 MB |
9. Zooming in on ETW Providers Some Interesting Kernel Providers.mp4 |
2.4 MB |
|
1.6 MB |
11. Zooming in on ETW Providers Identifying Processes Linked to Providers.mp4 |
3.1 MB |
|
4.5 MB |
|
1.4 MB |
|
1.4 MB |
|
3.0 MB |
|
2.2 MB |
17. Assessing Data Source Visibility Coverage Using DeTTECT.mp4 |
826.6 KB |
|
1.1 MB |
|
1.6 MB |
|
1.8 MB |
|
9.7 MB |
/.../7. Rulebased versus anomalybased detection/ |
|
|
2.3 MB |
|
1.9 MB |
|
8.1 MB |
|
6.4 MB |
|
3.8 MB |
|
1.5 MB |
|
811.9 KB |
|
1.4 MB |
|
609.5 KB |
|
2.6 MB |
|
1.1 MB |
|
2.6 MB |
|
616.1 KB |
|
1.0 MB |
|
1.7 MB |
|
259.1 KB |
|
2.2 MB |
|
2.4 MB |
|
563.2 KB |
/.../8. Building a stack for adversary emulation/ |
|
|
762.1 KB |
|
5.9 MB |
|
1.9 MB |
|
1.6 MB |
|
1.0 MB |
|
655.8 KB |
|
599.0 KB |
|
1.3 MB |
|
1.7 MB |
|
466.5 KB |
|
572.4 KB |
|
2.7 MB |
|
340.8 KB |
|
2.7 MB |
|
2.2 MB |
|
412.8 KB |
|
836.9 KB |
|
577.6 KB |
|
1.0 MB |
|
1.2 MB |
|
580.6 KB |
|
949.7 KB |
|
2.2 MB |
|
253.6 KB |
|
522.7 KB |
|
1.9 MB |
|
3.2 MB |
|
2.3 MB |
|
2.3 MB |
|
882.5 KB |
/.../9. Automated emulation using MITRE Caldera/ |
|
|
2.1 MB |
|
4.1 MB |
|
761.2 KB |
|
749.4 KB |
|
1.3 MB |
|
1.9 MB |
|
1.5 MB |
8. MITRE Caldera Chain Interface Walkthrough Adversaries.mp4 |
1.1 MB |
|
1.8 MB |
|
603.6 KB |
|
1.7 MB |
|
1.6 MB |
|
243.9 KB |
|
372.4 KB |
|
1.2 MB |
|
464.3 KB |
|
464.1 KB |
|
1.5 MB |
|
524.7 KB |
|
425.5 KB |
|
1.2 MB |
|
2.8 MB |
|
501.1 KB |
|
4.8 MB |
/.../1. Techniques Covered in Section 2/ |
|
|
2.5 MB |
|
4.6 MB |
|
4.8 MB |
|
3.8 MB |
/.../2. Traditional Attack Strategies Defenses/ |
|
|
346.8 KB |
|
6.2 MB |
|
2.6 MB |
|
3.8 MB |
|
1.0 MB |
|
4.8 MB |
|
4.4 MB |
8. Modern Credential Phishing Attacks Oauth Attacks Examples.mp4 |
3.2 MB |
|
3.7 MB |
|
2.5 MB |
|
3.3 MB |
/.../3. AntiMalware Scanning Interface AMSI/ |
|
|
2.8 MB |
|
2.3 MB |
|
2.9 MB |
|
1.4 MB |
|
6.6 MB |
|
6.8 MB |
|
4.8 MB |
8. AMSI Bypass Strategies RastaMouse AMSI Bypass in Action.mp4 |
2.6 MB |
|
1.6 MB |
|
3.4 MB |
|
2.6 MB |
|
8.3 MB |
/.../4. Office Macro Obfuscation Techniques/ |
|
|
372.9 KB |
|
9.5 MB |
|
1.6 MB |
|
1.2 MB |
|
4.3 MB |
|
2.3 MB |
|
606.8 KB |
/.../5. Application Execution Control/ |
|
|
2.5 MB |
|
1.8 MB |
|
2.9 MB |
|
1.4 MB |
|
2.4 MB |
|
2.4 MB |
|
3.5 MB |
|
2.6 MB |
|
1.3 MB |
|
3.1 MB |
|
1.6 MB |
|
924.0 KB |
|
1.9 MB |
|
1.1 MB |
|
2.1 MB |
|
766.1 KB |
|
1.8 MB |
|
5.1 MB |
|
3.4 MB |
|
492.3 KB |
/.../6. ExploitGuard Attack Surface Reduction Rules/ |
|
|
2.8 MB |
|
3.7 MB |
|
3.1 MB |
|
1.9 MB |
|
494.8 KB |
|
802.7 KB |
7. Code Integrity Guard Formerly Attack Surface Reduction.mp4 |
1.5 MB |
|
6.5 MB |
|
2.0 MB |
|
1.7 MB |
|
1.3 MB |
|
896.6 KB |
|
1.9 MB |
|
2.9 MB |
|
2.4 MB |
|
655.7 KB |
|
1.2 MB |
|
3.6 MB |
|
618.3 KB |
|
773.4 KB |
|
2.5 MB |
|
1.6 MB |
|
1.3 MB |
|
339.5 KB |
|
2.2 MB |
|
1.1 MB |
|
1.6 MB |
|
2.3 MB |
|
3.5 MB |
|
229.9 KB |
/.../7. Zooming in on Windows Internals/ |
|
|
3.4 MB |
|
2.0 MB |
|
1.6 MB |
|
5.2 MB |
|
1.5 MB |
|
1.7 MB |
7. Introducing the WIN32 API Writeprocessmemory CreateRemoteThread.mp4 |
1.9 MB |
|
2.6 MB |
|
4.6 MB |
/.../8. Bypassing Security Products Through Process Shenanigans/ |
|
|
308.4 KB |
|
3.7 MB |
|
2.8 MB |
|
2.4 MB |
|
658.8 KB |
|
5.7 MB |
|
1.6 MB |
|
6.5 MB |
|
4.6 MB |
|
3.9 MB |
11. An Example Cobalt Strikes ExecuteAssembly and spawnto.mp4 |
9.2 MB |
|
2.5 MB |
|
4.8 MB |
|
4.7 MB |
|
3.2 MB |
|
4.3 MB |
|
2.9 MB |
|
3.1 MB |
|
2.1 MB |
|
2.7 MB |
21. Process Hollowing with Donut Shellcode and TikiTorch 1.mp4 |
3.3 MB |
22. Process Hollowing with Donut Shellcode and TikiTorch 2.mp4 |
3.9 MB |
|
3.5 MB |
|
1.9 MB |
|
3.2 MB |
|
2.0 MB |
|
4.5 MB |
|
992.1 KB |
|
1.5 MB |
|
2.8 MB |
|
3.5 MB |
|
2.8 MB |
|
3.5 MB |
34. Prevent AV EDR Injection Manipulating ProcThreadAttributes 1.mp4 |
1.6 MB |
35. Prevent AV EDR Injection Manipulating ProcThreadAttributes 2.mp4 |
2.6 MB |
36. Prevent AV EDR Injection Manipulating ProcThreadAttributes 3.mp4 |
1.8 MB |
37. Prevent AV EDR Injection Manipulating ProcThreadAttributes 4.mp4 |
2.3 MB |
|
3.3 MB |
|
1.8 MB |
/.../9. Hunting for These Shenanigans/ |
|
|
3.5 MB |
|
1.5 MB |
|
2.7 MB |
|
1.9 MB |
|
2.1 MB |
|
10.8 MB |
|
5.3 MB |
|
215.7 KB |
/.../2. Initial Intrusion Strategies Emulation Detection/10. Conclusions/ |
|
|
369.4 KB |
|
2.5 MB |
|
3.8 MB |
|
3.2 MB |
/.../1. Techniques Covered in Section 3/ |
|
|
2.4 MB |
|
5.4 MB |
|
5.0 MB |
|
6.1 MB |
5. Local Administrator Perks Silencing Sysmon Unloading 1.mp4 |
5.1 MB |
6. Local Administrator Perks Silencing Sysmon Unloading 2.mp4 |
2.3 MB |
7. Local Administrator Perks Silencing Sysmon Unloading 3.mp4 |
3.1 MB |
8. Local Administrator Perks Silencing Sysmon Unloading 4.mp4 |
2.7 MB |
|
1.7 MB |
10. Local Administrator Perks Silencing Sysmon Hooking 2.mp4 |
1.3 MB |
11. Local Administrator Perks Silencing Sysmon Hooking 3.mp4 |
1.3 MB |
12. Local Administrator Perks Silencing Sysmon Hooking 4.mp4 |
2.5 MB |
13. Local Administrator Perks Silencing Sysmon Hooking 5.mp4 |
2.2 MB |
14. Local Administrator Perks Silencing Sysmon Hooking 6.mp4 |
1.9 MB |
/.../3. Lateral Movement Emulation Detection/2. Bloodhound Enumeration/ |
|
|
405.4 KB |
|
6.8 MB |
|
6.4 MB |
|
2.2 MB |
|
1.8 MB |
|
1.5 MB |
|
3.3 MB |
|
7.0 MB |
|
7.0 MB |
|
3.5 MB |
|
2.6 MB |
|
3.3 MB |
|
2.3 MB |
|
2.9 MB |
|
2.6 MB |
|
7.7 MB |
|
1.0 MB |
|
2.3 MB |
|
2.3 MB |
|
414.8 KB |
/.../3. LSASS Credential Stealing Techniques/ |
|
|
3.0 MB |
|
1.9 MB |
|
2.0 MB |
|
1.3 MB |
|
3.0 MB |
|
644.5 KB |
|
3.9 MB |
|
5.7 MB |
|
1.9 MB |
|
7.9 MB |
|
9.6 MB |
|
3.9 MB |
|
6.2 MB |
|
1.6 MB |
|
1.4 MB |
|
2.9 MB |
|
1.4 MB |
|
1.2 MB |
|
2.0 MB |
|
2.3 MB |
|
2.9 MB |
|
3.9 MB |
23. LSASS Dumping Detecting the Tools Example SIGMA Rules 1.mp4 |
1.6 MB |
24. LSASS Dumping Detecting the Tools Example SIGMA Rules 2.mp4 |
2.3 MB |
|
3.1 MB |
26. LSASS Dumping Detecting the Techniques Sysmon Event ID 7.mp4 |
3.3 MB |
|
6.7 MB |
28. LSASS Dumping Detecting the Techniques Example SIGMA.mp4 |
2.6 MB |
29. LSASS Dumping Detecting the Techniques Sysmon Event ID 8.mp4 |
2.0 MB |
30. LSASS Dumping Detecting the Techniques Example SIGMA 1.mp4 |
1.9 MB |
31. LSASS Dumping Detecting the Techniques Sysmon Event ID 10 1.mp4 |
3.7 MB |
32. LSASS Dumping Detecting the Techniques Sysmon Event ID 10 2.mp4 |
887.2 KB |
33. LSASS Dumping Detecting the Techniques Sysmon Event ID 10 3.mp4 |
960.7 KB |
34. LSASS Dumping Detecting the Techniques Sysmon Event ID 10 4.mp4 |
961.0 KB |
35. LSASS Dumping Detecting the Techniques Example SIGMA 2.mp4 |
1.2 MB |
36. LSASS Dumping Detecting the Techniques Example SIGMA 3.mp4 |
3.5 MB |
|
2.8 MB |
38. LSASS Dumping Detecting the Techniques Process Access Rights 1.mp4 |
574.4 KB |
39. LSASS Dumping Detecting the Techniques Process Access Rights 2.mp4 |
675.7 KB |
40. LSASS Dumping Detecting the Techniques Process Access Rights 3.mp4 |
4.2 MB |
|
2.1 MB |
|
4.7 MB |
43. LSASS Dumping Detecting the Techniques Process Access Rights.mp4 |
3.1 MB |
44. LSASS Dumping Detecting the Techniques Mimikatz Driver.mp4 |
1.8 MB |
45. LSASS Dumping Detecting the Techniques Example SIGMA 4.mp4 |
3.9 MB |
|
6.9 MB |
|
2.6 MB |
|
524.2 KB |
/.../4. Stealing Credentials without Touching LSASS/ |
|
|
4.6 MB |
|
9.7 MB |
|
3.4 MB |
|
2.4 MB |
|
1.3 MB |
|
3.8 MB |
|
4.0 MB |
|
1.2 MB |
|
2.7 MB |
|
4.6 MB |
|
3.6 MB |
|
2.1 MB |
|
1.3 MB |
14. How Does Internal Monologue Work LM Authentication Levels.mp4 |
2.6 MB |
|
2.7 MB |
|
2.9 MB |
|
4.2 MB |
|
234.2 KB |
|
450.6 KB |
/.../5. Stealing NTLMv2 ChallengeResponse/ |
|
|
2.3 MB |
|
5.4 MB |
|
4.0 MB |
|
1.9 MB |
|
7.3 MB |
|
2.8 MB |
7. Capturing NTLM Challenge Responses Using Office Step 1.mp4 |
630.1 KB |
8. Capturing NTLM Challenge Responses Using Office Step 2.mp4 |
479.8 KB |
9. Capturing NTLM Challenge Responses Using Office Step 3.mp4 |
435.3 KB |
10. Capturing NTLM Challenge Responses Using Office Step 4.mp4 |
1.8 MB |
|
2.5 MB |
|
6.0 MB |
|
6.1 MB |
|
769.4 KB |
|
5.5 MB |
|
3.0 MB |
|
4.5 MB |
|
1.4 MB |
|
8.7 MB |
|
2.2 MB |
|
935.8 KB |
/.../3. Lateral Movement Emulation Detection/6. Kerberos Refresh/ |
|
|
1.2 MB |
|
9.0 MB |
|
9.5 MB |
|
5.3 MB |
|
6.5 MB |
|
5.2 MB |
7. A Kerberos Refresh Authentication Flow Service Ticket .mp4 |
5.5 MB |
8. A Kerberos Refresh Authentication Flow PAC Validation.mp4 |
6.0 MB |
|
19.5 MB |
|
37.7 MB |
|
1.3 MB |
|
2.3 MB |
|
2.1 MB |
/.../7. Unconstrained Delegation Attacks/ |
|
|
2.1 MB |
|
4.5 MB |
|
3.8 MB |
|
640.7 KB |
|
6.6 MB |
|
1.8 MB |
|
811.4 KB |
|
5.4 MB |
|
1.6 MB |
|
1.3 MB |
|
951.2 KB |
12. Attacking Kerberos Unconstrained Delegation Step 5 1.mp4 |
796.5 KB |
13. Attacking Kerberos Unconstrained Delegation Step 5 2.mp4 |
1.2 MB |
14. Krbrelayx An Unconstrained Delegation Attack Toolkit.mp4 |
3.1 MB |
|
5.9 MB |
|
459.7 KB |
/.../8. ResourceBased Constrained Delegation/ |
|
|
594.6 KB |
|
13.7 MB |
|
4.5 MB |
|
2.2 MB |
|
1.7 MB |
|
2.4 MB |
|
5.4 MB |
|
765.3 KB |
|
889.6 KB |
|
1.5 MB |
|
4.5 MB |
|
2.5 MB |
|
1.7 MB |
|
805.0 KB |
|
2.0 MB |
|
544.0 KB |
|
993.2 KB |
|
1.1 MB |
|
1.3 MB |
|
1.2 MB |
|
1.9 MB |
|
7.9 MB |
|
7.8 MB |
|
4.0 MB |
|
2.7 MB |
26. Exercise ResourceBased Constrained Delegation Attacks.mp4 |
286.3 KB |
/.../3. Lateral Movement Emulation Detection/9. Conclusions/ |
|
|
321.6 KB |
|
7.2 MB |
|
7.8 MB |
|
2.8 MB |
/.../1. Techniques Covered in Section 4/ |
|
|
2.6 MB |
|
877.4 KB |
|
3.0 MB |
|
3.6 MB |
/.../2. Breaking Domain Forest Trusts/ |
|
|
2.0 MB |
|
6.5 MB |
|
6.1 MB |
|
8.4 MB |
|
3.0 MB |
|
1.6 MB |
|
3.8 MB |
|
2.1 MB |
|
2.9 MB |
10. How Does Authentication Work Over a Trust Kerberos 3.mp4 |
2.0 MB |
|
1.1 MB |
|
3.2 MB |
|
3.8 MB |
|
9.3 MB |
|
5.0 MB |
|
10.2 MB |
|
6.0 MB |
|
2.0 MB |
|
2.8 MB |
|
581.6 KB |
/.../3. COM Object Hijacking/ |
|
|
580.1 KB |
|
7.8 MB |
3. COM Object Hijacking Strategies Phantom COM Objects 1.mp4 |
1.9 MB |
4. COM Object Hijacking Strategies Phantom COM Objects 2.mp4 |
751.5 KB |
5. COM Object Hijacking Strategies COM Search Order Hijacking 1.mp4 |
3.1 MB |
6. COM Object Hijacking Strategies COM Search Order Hijacking 2.mp4 |
1.3 MB |
7. COM Object Hijacking Strategies COM Search Order Hijacking 3.mp4 |
1.2 MB |
8. COM Object Hijacking Strategies COM Search Order Hijacking 4.mp4 |
1.8 MB |
9. COM Object Hijacking Strategies COM Search Order Hijacking 5.mp4 |
978.0 KB |
10. COM Object Hijacking Strategies COM Search Order Hijacking 6.mp4 |
908.7 KB |
11. COM Object Hijacking Strategies COM Object Linking 1.mp4 |
1.0 MB |
12. COM Object Hijacking Strategies COM Object Linking 2.mp4 |
583.0 KB |
13. COM Object Hijacking Strategies COM Object Linking 3.mp4 |
239.5 KB |
|
10.6 MB |
|
4.0 MB |
|
322.5 KB |
/.../4. Persistence Emulation Detection/4. WMI Persistence/ |
|
|
347.9 KB |
|
3.3 MB |
|
7.4 MB |
|
4.4 MB |
|
3.0 MB |
|
1.5 MB |
|
2.7 MB |
|
1.8 MB |
|
1.1 MB |
|
1.7 MB |
|
2.8 MB |
|
3.7 MB |
|
7.3 MB |
|
554.5 KB |
|
271.4 KB |
/.../5. AppCert AppInit Netsh Helper DLL/ |
|
|
2.7 MB |
|
1.6 MB |
|
886.7 KB |
|
2.3 MB |
|
2.0 MB |
6. Authentication Packages and Security Support Providers.mp4 |
2.8 MB |
|
2.4 MB |
|
1.8 MB |
|
2.4 MB |
|
2.5 MB |
|
924.9 KB |
|
704.0 KB |
|
8.7 MB |
|
2.1 MB |
|
428.3 KB |
/.../6. Office Template Library Tricks/ |
|
|
2.3 MB |
|
1.3 MB |
|
1.5 MB |
|
1.5 MB |
|
892.4 KB |
|
720.5 KB |
|
726.9 KB |
|
3.2 MB |
|
2.4 MB |
|
961.7 KB |
|
877.1 KB |
|
1.6 MB |
|
1.2 MB |
|
1.6 MB |
|
3.3 MB |
|
2.2 MB |
|
457.7 KB |
/.../4. Persistence Emulation Detection/7. Application Shimming/ |
|
|
534.9 KB |
|
7.0 MB |
3. Step 1 Installing the Application Compatibility Toolkit.mp4 |
2.0 MB |
|
733.7 KB |
|
3.0 MB |
|
2.9 MB |
|
1.6 MB |
|
802.4 KB |
|
1.9 MB |
10. Detecting the Persistence Mechanism Programs and Features.mp4 |
1.6 MB |
|
1.1 MB |
|
653.1 KB |
|
2.0 MB |
|
3.8 MB |
|
3.0 MB |
|
697.9 KB |
/.../8. Stealth AD Persistence Manipulation/ |
|
|
2.7 MB |
|
6.9 MB |
|
3.1 MB |
|
5.2 MB |
|
582.7 KB |
|
637.2 KB |
|
1.7 MB |
|
398.8 KB |
|
477.9 KB |
|
603.6 KB |
|
853.8 KB |
|
525.3 KB |
|
423.7 KB |
|
205.7 KB |
15. Security Descriptor Reviewing The ACE Access Mask 10.mp4 |
596.9 KB |
16. Security Descriptor Reviewing The ACE Access Mask 11.mp4 |
1.3 MB |
17. Security Descriptor Reviewing The ACE Access Mask 12.mp4 |
230.1 KB |
18. Security Descriptor Reviewing The ACE Access Mask 13.mp4 |
297.3 KB |
19. Security Descriptor Reviewing The ACE Access Mask 14.mp4 |
206.8 KB |
20. Security Descriptor Reviewing The ACE Access Mask 15.mp4 |
176.4 KB |
21. Security Descriptor Reviewing The ACE Access Mask 16.mp4 |
216.0 KB |
22. Security Descriptor Reviewing The ACE Access Mask 17.mp4 |
216.0 KB |
23. Security Descriptor Reviewing The ACE Access Mask 18.mp4 |
550.4 KB |
|
1.1 MB |
|
676.2 KB |
|
761.9 KB |
|
1.4 MB |
|
424.2 KB |
|
796.7 KB |
30. Security Descriptor Persistence STAGE 2 Choosing tactics 1.mp4 |
1.8 MB |
31. Security Descriptor Persistence STAGE 2 Choosing tactics 2.mp4 |
2.0 MB |
32. Security Descriptor Persistence STAGE 2 Choosing tactics 3.mp4 |
625.7 KB |
33. Security Descriptor Persistence STAGE 2 Choosing tactics 4.mp4 |
930.4 KB |
34. Security Descriptor Persistence STAGE 2 Choosing tactics 5.mp4 |
1.6 MB |
35. Security Descriptor Persistence STAGE 2 Choosing tactics 6.mp4 |
836.2 KB |
36. Security Descriptor Persistence STAGE 3 Being Obscure 1.mp4 |
2.4 MB |
37. Security Descriptor Persistence STAGE 3 Being Obscure 2.mp4 |
1.2 MB |
38. Security Descriptor Persistence STAGE 3 Being Obscure 3.mp4 |
981.7 KB |
39. Security Descriptor Persistence STAGE 3 Being Obscure 4.mp4 |
992.4 KB |
40. Security Descriptor Persistence STAGE 3 Being Obscure 5.mp4 |
1.2 MB |
|
6.6 MB |
|
2.3 MB |
|
2.2 MB |
/.../4. Persistence Emulation Detection/9. Conclusions/ |
|
|
239.2 KB |
|
4.9 MB |
|
5.8 MB |
|
6.8 MB |
|
3.7 MB |
|
4.1 MB |
|
4.8 MB |
|
3.0 MB |
|
3.6 MB |
/.../1. Azure AD Structure and Management/ |
|
|
1.8 MB |
|
3.5 MB |
|
328.7 KB |
|
2.2 MB |
|
452.3 KB |
|
1.8 MB |
|
5.3 MB |
|
4.1 MB |
|
1.6 MB |
|
1.2 MB |
|
1.8 MB |
|
2.6 MB |
|
2.8 MB |
|
3.4 MB |
|
2.6 MB |
|
1.2 MB |
|
1.1 MB |
/.../2. Azure AD Hybrid Authentication/ |
|
|
2.1 MB |
|
6.3 MB |
|
1.0 MB |
|
3.7 MB |
|
599.7 KB |
|
728.5 KB |
|
6.2 MB |
|
1.8 MB |
|
2.8 MB |
|
2.3 MB |
|
3.6 MB |
|
2.4 MB |
13. Attacking Seamless SSO User Impersonation with AZUREADSSO Account 1.mp4 |
5.0 MB |
14. Attacking Seamless SSO User impersonation with AZUREADSSO Account 2.mp4 |
3.2 MB |
/.../3. Azure AD Authentication Methods/ |
|
|
538.7 KB |
|
3.2 MB |
|
1.5 MB |
4. Azure AD Enterprise Applications Authentication Protocols.mp4 |
3.9 MB |
|
2.5 MB |
/.../4. Azure AD Conditional Access/ |
|
|
593.5 KB |
|
4.8 MB |
3. Azure AD Conditional Access Blocking Legacy Authentication 1.mp4 |
2.0 MB |
4. Azure AD Conditional Access Blocking Legacy Authentication 2.mp4 |
826.3 KB |
5. Azure AD Conditional Access Blocking Legacy Authentication 3.mp4 |
1.3 MB |
6. Azure AD Conditional Access Blocking Legacy Authentication 4.mp4 |
1.1 MB |
|
3.1 MB |
/.../5. Introduction to Azure Identities/ |
|
|
269.9 KB |
|
3.8 MB |
|
2.9 MB |
|
1.1 MB |
|
622.6 KB |
|
1.4 MB |
|
2.8 MB |
|
1.8 MB |
|
2.6 MB |
|
1.7 MB |
|
1.7 MB |
/.../6. Azure AD Security Logging/ |
|
|
374.6 KB |
|
4.2 MB |
3. An Example of an Azure AD Risk Detection Investigation 1.mp4 |
941.0 KB |
4. An Example of an Azure AD Risk Detection Investigation 2.mp4 |
1.2 MB |
5. Advanced Detection Capabilities Defender for Endpoint.mp4 |
1.4 MB |
6. Advanced Detection Capabilities Defender for Identity.mp4 |
2.7 MB |
|
341.3 KB |
8. Advanced Detection Capabilities Azure Sentinel Example Rules.mp4 |
562.9 KB |
/.../7. APT28 Emulation Plan/ |
|
|
395.5 KB |
|
5.1 MB |
|
1.2 MB |
4. Phase 1 Initial Access Technique T1566001 Spearphishing Attachment.mp4 |
5.9 MB |
|
1.7 MB |
6. Phase 1 Defense Evasion Technique T1055012 Process Hollowing.mp4 |
3.4 MB |
|
3.2 MB |
8. Phase 2 Privilege Escalation Technique T1558003 Kerberoasting.mp4 |
3.4 MB |
|
3.9 MB |
|
2.6 MB |
|
3.0 MB |
|
504.7 KB |
/.../8. APT34 Emulation Plan/ |
|
|
305.3 KB |
|
4.2 MB |
|
2.8 MB |
4. Phase 1 Execution Technique T1566002 Spearphishing Link.mp4 |
1.9 MB |
|
6.3 MB |
|
1.3 MB |
7. Phase 2 Discovery Technique T1187 Forced Authentication.mp4 |
1.6 MB |
|
3.1 MB |
|
2.2 MB |
10. Phase 2 Credential Access Technique T1003 Credential Dumping.mp4 |
4.2 MB |
|
1.7 MB |
12. Phase 3 Defense Evasion Technique T1564001 Hidden Files.mp4 |
1.4 MB |
|
1.9 MB |
|
518.0 KB |
/.../9. Turla Emulation Plan/ |
|
|
280.3 KB |
|
3.3 MB |
|
1.7 MB |
|
2.6 MB |
|
1.9 MB |
6. Phase 2 Privilege Escalation Technique T1003 Credential Dumping.mp4 |
4.9 MB |
7. Phase 2 Defense Evasion Technique T1562001 Disabling Security Tools.mp4 |
1.6 MB |
8. Phase 3 Impact Technique T1490 Inhibit System Recovery.mp4 |
1.7 MB |
|
2.1 MB |
|
403.2 KB |
|
3.3 MB |
/.../1. Adversary Emulation Capstone/ |
|
|
537.5 KB |
|
4.7 MB |
|
56.8 KB |
|
153.7 KB |
|
123.1 KB |
|
104.7 KB |
|
101.5 KB |
|
127.8 KB |
|
131.9 KB |
|
115.6 KB |
|
143.3 KB |
|
107.1 KB |
|
127.4 KB |
|
32.8 KB |
|
61.5 KB |
|
5.6 MB |
|
4.7 MB |
|
872.5 KB |
|
716.3 KB |
|
846.1 KB |
|
4.4 MB |
|
6.1 MB |
|
8.1 MB |
Total files 786 |
Copyright © 2024 FileMood.com