Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'azure' or ''.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 9 results

  1. Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive into practical recipes for implementing security solutions for Microsoft Azure resources Learn how to implement Microsoft Defender for Cloud and Microsoft Sentinel Work with real-world examples of Azure Platform security capabilities to develop skills quickly Book Description With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems. This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you'll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you'll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you'll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity. By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources. What you will learn Find out how to implement Azure security features and tools Understand how to provide actionable insights into security incidents Gain confidence in securing Azure resources and operations Shorten your time to value for applying learned skills in real-world cases Follow best practices and choices based on informed decisions Better prepare for Microsoft certification with a security element Who this book is for This book is for Azure security professionals, Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Microsoft Defender for Cloud and other Azure security features. A solid understanding of fundamental security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively. This book is also beneficial for those aiming to take Microsoft certification exams with a security element or focus. Table of Contents Securing Azure AD Identities Securing Azure Networks Securing Remote Access Securing Virtual Machines Securing Azure SQL Databases Securing Azure Storage Using Advisor Using Microsoft Defender for Cloud Using Microsoft Sentinel Using Traffic Analytics [Hidden Content] [hide][Hidden Content]]
  2. Proxies: Yes Bots: 100 Email:Pass Capture: Account Status / Account Type / Full Name / Country / Phone Number / Subscription Name / Subscription Status / Status / quotaID / Suspend / Payment Type / Payment Method / Number Last Four / Expiration Date / IsActive / Remaining Balance / Used Balance / Active Subscription / Days Left / Expiry Date [hide][Hidden Content]]
  3. Proxies: Yes Bots: 100 Email:Pass Capture: Good Accounts [hide][Hidden Content]]
  4. Proxies: Yes Bots: 100 Email:Pass Capture: Account Status / Account Type / Full Name / Country / Phone Number / Subscription Name / Subscription Status / Status / quotaID / Suspend / Payment Type / Payment Method / Number Last Four / Expiration Date / IsActive / Remaining Balance / Used Balance / Active Subscription / Days Left / Expiry Date [hide][Hidden Content]]
  5. Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus. How does it work? Then CobaltBus DotNetCore binary that integrates with CobaltStrikes ExternalC2, will create a local SqliteDB in order to keep track of multiple beacons. The messages inbound to CobaltBus will be captured and written to the database. The database names “CobaltBus.db” and “CobaltBus-log.db” will be created in the directory CobaltBus.dll is running from. Once a Beacon binary runs, it will push an “INITIALIZE” message to the baseQueueName queue, with a randomly generated BeaconId and Pipename. The CobaltBus handler will then capture this, create and move into the two new queues based on the BeaconId sent, request stager shellcode from the CobaltStrike, and push it back down the new queue as an “INJECT” message. From here, the Beacon project injects the captured shellcode into memory and establishes a connection with the CobaltStrike beacon over the generated pipe name. When a command is issued from CobaltBus, it is pushed down the beacon respective queue and into the beacon pipe name. [hide][Hidden Content]]
  6. Proxies: Yes Bots: 100 Email:Pass EDU Capture: Account Status / Account Type / Full Name / Country / Status / Payment Method / IsActive / Active Subscription / Days Left / Expiry Date [hide][Hidden Content]]
  7. Proxies: Yes Bots: 100 Email:Pass EDU Capture: Account Status / Account Type / Name / Subscriptions / Status / Validity / Balance / Offer Expiring IN [hide][Hidden Content]]
  8. [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.