instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Large-scale LDAP brute force attempts detected in logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Unexpected use of administrative utilities across many hosts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Anomalous certificate issuance logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Anomalous certificate issuance logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Anomalous certificate issuance logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Anomalous certificate issuance logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Anomalous certificate issuance logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Correlate across telemetry (network, EDR, authenticatio... |
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Anomalous certificate issuance logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Unexpected use of administrative utilities across many hosts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Unexpected use of administrative utilities across many hosts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.
Step 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 4: Triage the affected logs and extract indicators (source IP, ac... |
Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Large-scale LDAP brute force attempts detected in logs | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.
Step 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.
Step 4: Tune detection rules with labeled data from lab reproductions... |
Coordinating blue-team telemetry collection: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Coordinating blue-team telemetry collection | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 3: Define clear scope, rules of engagement, and escalation contacts.
Step 4: Establish emergency stop procedures and communication channels.
Defender detection notes:
... |
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Define clear scope, rules of engagement, and escalation contacts.
Step 3: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 4: Establish emergency stop procedures and communication channels.
Defender detection notes:
... |
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Define clear scope, rules of engagement, and escalation contacts.
Step 3: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 4: Establish emergency stop procedures and communication channels.
Defender detection notes:
... |
Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 3: Establish emergency stop procedures and communication channels.
Step 4: Define clear scope, rules of engagement, and escalation contacts.
Defender detection notes:
... |
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 3: Establish emergency stop procedures and communication channels.
Step 4: Define clear scope, rules of engagement, and escalation contacts.
Defender detection notes:
... |
Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 3: Establish emergency stop procedures and communication channels.
Step 4: Define clear scope, rules of engagement, and escalation contacts.
Defender detection notes:
... |
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 3: Establish emergency stop procedures and communication channels.
Step 4: Define clear scope, rules of engagement, and escalation contacts.
Defender detection notes:
... |
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 3: Establish emergency stop procedures and communication channels.
Step 4: Define clear scope, rules of engagement, and escalation contacts.
Defender detection notes:
... |
Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 3: Define clear scope, rules of engagement, and escalation contacts.
Step 4: Establish emergency stop procedures and communication channels.
Defender detection notes:
... |
Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Red-team exercise kickoff | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.
Step 3: Establish emergency stop procedures and communication channels.
Step 4: Define clear scope, rules of engagement, and escalation contacts.
Defender detection notes:
... |
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Map the local network perspective and identify what domain re... |
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Public-facing web app with possible misconfiguration | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Search non-destructively for credential material in u... |
User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Assess potential for lateral movement from this host ... |
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Search non-destructively for credential material in u... |
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Map the local network perspective and identify w... |
OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Assess potential for lateral movement from this host and priorit... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Map the local network perspective and identify what domain re... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Coordinate with defenders to capture telemetry for each test ... |
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Map the local network perspective and identify what... |
OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Coordinate with defenders to capture telemetry for each test ... |
Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Exposed remote management interface reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Assess potential for lateral movement from this hos... |
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Search non-destructively for credential material in u... |
Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each test to... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Map the local network perspective and identify what domain ... |
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Assess potential for lateral movement from this host and prio... |
Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Map the local network perspective and identify wha... |
OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each test ... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Coordinate with defenders to capture telemetry for each test to... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material in user profil... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Search non-destructively for credential material... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Map the local network perspective and identify what domain re... |
Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Exposed remote management interface reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Search non-destructively for credential material... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Search non-destructively for credential material i... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Assess potential for lateral movement from this host ... |
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Public-facing web app with possible misconfiguration | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Enumerate visible services and shares without altering state ... |
User opened document with embedded macro: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Coordinate with defenders to capture telemetry for each tes... |
Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Phishing foothold on user workstation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Assess potential for lateral movement from this host and priorit... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Map the local network perspective and identify what domain ... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each test ... |
Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Map the local network perspective and identify what domain re... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Search non-destructively for credential material in u... |
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Enumerate visible services and shares without alterin... |
Exposed remote management interface reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Exposed remote management interface reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material in user profil... |
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Search non-destructively for credential material in user prof... |
Public-facing web app with possible misconfiguration: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Public-facing web app with possible misconfiguration | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each te... |
User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material i... |
Exposed remote management interface reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Exposed remote management interface reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Coordinate with defenders to capture telemetry for each tes... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Map the local network perspective and identify wha... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material i... |
Supplier/third-party compromise suspected: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Assess potential for lateral movement from this host ... |
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Coordinate with defenders to capture telemetry for each test to ... |
Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material in user p... |
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Public-facing web app with possible misconfiguration | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Map the local network perspective and identify w... |
OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Assess potential for lateral movement from this host and priori... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Enumerate visible services and shares without al... |
Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Phishing foothold on user workstation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Enumerate visible services and shares without alterin... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Map the local network perspective and identify wha... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each te... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Search non-destructively for credential material in user prof... |
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Assess potential for lateral movement from this host ... |
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc... |
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ... |
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or privileged acc... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu... |
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or privileged acc... |
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t... |
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm... |
Network foothold with standard user rights: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Prioritize targets that are likely to yield credentials or privileged acc... |
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.