instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Large-scale LDAP brute force attempts detected in logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Tune detection rules with labeled data from lab reproductions...
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Unexpected use of administrative utilities across many hosts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Tune detection rules with labeled data from lab reproductions...
Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Anomalous certificate issuance logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Anomalous certificate issuance logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Anomalous certificate issuance logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Tune detection rules with labeled data from lab reproductions...
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Tune detection rules with labeled data from lab reproductions...
Anomalous certificate issuance logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Anomalous certificate issuance logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Correlate across telemetry (network, EDR, authenticatio...
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Tune detection rules with labeled data from lab reproductions...
Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Anomalous certificate issuance logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Tune detection rules with labeled data from lab reproductions...
Unexpected use of administrative utilities across many hosts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Tune detection rules with labeled data from lab reproductions...
Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Tune detection rules with labeled data from lab reproductions...
Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Unexpected use of administrative utilities across many hosts
Step 1: Confirm authorization and scope before proceeding. Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives. Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 4: Triage the affected logs and extract indicators (source IP, ac...
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Large-scale LDAP brute force attempts detected in logs
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope. Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting. Step 4: Tune detection rules with labeled data from lab reproductions...
Coordinating blue-team telemetry collection: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Coordinating blue-team telemetry collection
Step 1: Confirm authorization and scope before proceeding. Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 3: Define clear scope, rules of engagement, and escalation contacts. Step 4: Establish emergency stop procedures and communication channels. Defender detection notes: ...
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Define clear scope, rules of engagement, and escalation contacts. Step 3: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 4: Establish emergency stop procedures and communication channels. Defender detection notes: ...
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Define clear scope, rules of engagement, and escalation contacts. Step 3: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 4: Establish emergency stop procedures and communication channels. Defender detection notes: ...
Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 3: Establish emergency stop procedures and communication channels. Step 4: Define clear scope, rules of engagement, and escalation contacts. Defender detection notes: ...
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 3: Establish emergency stop procedures and communication channels. Step 4: Define clear scope, rules of engagement, and escalation contacts. Defender detection notes: ...
Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 3: Establish emergency stop procedures and communication channels. Step 4: Define clear scope, rules of engagement, and escalation contacts. Defender detection notes: ...
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 3: Establish emergency stop procedures and communication channels. Step 4: Define clear scope, rules of engagement, and escalation contacts. Defender detection notes: ...
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 3: Establish emergency stop procedures and communication channels. Step 4: Define clear scope, rules of engagement, and escalation contacts. Defender detection notes: ...
Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 3: Define clear scope, rules of engagement, and escalation contacts. Step 4: Establish emergency stop procedures and communication channels. Defender detection notes: ...
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Red-team exercise kickoff
Step 1: Confirm authorization and scope before proceeding. Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions. Step 3: Establish emergency stop procedures and communication channels. Step 4: Define clear scope, rules of engagement, and escalation contacts. Defender detection notes: ...
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Map the local network perspective and identify what domain re...
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Public-facing web app with possible misconfiguration
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Search non-destructively for credential material in u...
User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Assess potential for lateral movement from this host ...
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Search non-destructively for credential material in u...
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Map the local network perspective and identify w...
OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Assess potential for lateral movement from this host and priorit...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Map the local network perspective and identify what domain re...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Coordinate with defenders to capture telemetry for each test ...
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Map the local network perspective and identify what...
OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Coordinate with defenders to capture telemetry for each test ...
Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Exposed remote management interface reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Assess potential for lateral movement from this hos...
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Search non-destructively for credential material in u...
Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each test to...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Map the local network perspective and identify what domain ...
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Assess potential for lateral movement from this host and prio...
Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Map the local network perspective and identify wha...
OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each test ...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Coordinate with defenders to capture telemetry for each test to...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material in user profil...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Search non-destructively for credential material...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Map the local network perspective and identify what domain re...
Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Exposed remote management interface reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Search non-destructively for credential material...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Search non-destructively for credential material i...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Assess potential for lateral movement from this host ...
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Public-facing web app with possible misconfiguration
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Enumerate visible services and shares without altering state ...
User opened document with embedded macro: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Coordinate with defenders to capture telemetry for each tes...
Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Phishing foothold on user workstation
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Assess potential for lateral movement from this host and priorit...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Map the local network perspective and identify what domain ...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each test ...
Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Map the local network perspective and identify what domain re...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Search non-destructively for credential material in u...
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Enumerate visible services and shares without alterin...
Exposed remote management interface reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Exposed remote management interface reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material in user profil...
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Search non-destructively for credential material in user prof...
Public-facing web app with possible misconfiguration: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Public-facing web app with possible misconfiguration
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each te...
User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material i...
Exposed remote management interface reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Exposed remote management interface reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Coordinate with defenders to capture telemetry for each tes...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Map the local network perspective and identify wha...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material i...
Supplier/third-party compromise suspected: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Assess potential for lateral movement from this host ...
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Coordinate with defenders to capture telemetry for each test to ...
Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material in user p...
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Public-facing web app with possible misconfiguration
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Map the local network perspective and identify w...
OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Assess potential for lateral movement from this host and priori...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Enumerate visible services and shares without al...
Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Phishing foothold on user workstation
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Enumerate visible services and shares without alterin...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Map the local network perspective and identify wha...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each te...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Search non-destructively for credential material in user prof...
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Assess potential for lateral movement from this host ...
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc...
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ...
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or pr...
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or privileged acc...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu...
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or privileged acc...
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t...
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or pr...
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm...
Network foothold with standard user rights: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or pr...
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Prioritize targets that are likely to yield credentials or privileged acc...
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...