instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc...
Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Prioritize targets that are likely to yield credentials or privilege...
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or pr...
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu...
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or pr...
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or pr...
Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu...
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Prioritize targets that are likely to yield credentials or privileged acc...
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ...
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the env...
Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-...
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-...
Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Prioritize targets that are likely to yield credentials or privileged acc...
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc...
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc...
Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Enumerate directory objects that are accessible and capture LDAP respons...
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ...
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t...
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the env...
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain-joined VM with read access to DC info
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc...
Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to a multi-share file server
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-...
Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Enumerate directory objects that are accessible and capture LDAP response...
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or pr...
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 3: Prioritize targets that are likely to yield credentials or privileged access. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the env...
Ability to perform internal DNS queries: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ...
Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Ability to perform internal DNS queries
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups. Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm...
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Read-only view into asset inventory/CMDB
Step 1: Confirm authorization and scope before proceeding. Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis. Step 4: Prioritize targets that are likely to yield credentials or privilege...
Network foothold with standard user rights: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Network foothold with standard user rights
Step 1: Confirm authorization and scope before proceeding. Step 2: Prioritize targets that are likely to yield credentials or privileged access. Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment. Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ...
DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
DPAPI masterkeys located for certain profiles
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Document detection opportunities and recommend telemetry to capture similar a...
DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
DPAPI masterkeys located for certain profiles
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Document detection opportunities and recommend telemetry to capture similar a...
Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender det...
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Document detection opportunities and recommend telemetry to capture similar activity. Defender detection n...
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica env...
DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
DPAPI masterkeys located for certain profiles
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Avoid live testing against production services; validate techniques in a replica environment. Defender det...
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Document detection opportunities and recommend telemetry to capture similar ...
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender det...
Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender detection n...
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Avoid live testing against production services; validate techniques in a replica environment. Defender det...
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Avoid live testing against production services; validate techniques in a replica environment. Defender det...
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Preserve artifacts and copy them for offline analysis ...
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Correlate artifacts with logs to determine timeline an...
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender det...
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Avoid live testing against production services; validate techniques in a replica envi...
DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
DPAPI masterkeys located for certain profiles
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Document detection opportunities and recommend telemetry to capture similar a...
Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Avoid live testing against production services; validate techniques in a replica envi...
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Document detection opportunities and recommend telemetry to capture similar ...
Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica envi...
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender detection n...
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Document detection opportunities and recommend telemetry to capture similar a...
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Preserve artifacts and copy them for offline analysis ...
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender detection n...
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Document detection opportunities and recommend telemetry to capture similar a...
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender detection n...
DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
DPAPI masterkeys located for certain profiles
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica envi...
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Document detection opportunities and recommend telemetry to capture similar a...
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Avoid live testing against production services; validate techniques in a replica envi...
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Document detection opportunities and recommend telemetry to capture similar ...
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Avoid live testing against production services; validate techniques in a replica environment. Defender det...
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Document detection opportunities and recommend telemetry to capture similar ...
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender det...
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender detection n...
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Preserve artifacts and copy them for offline analysis ...
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender det...
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender detection n...
Potential LSASS artifacts on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Avoid live testing against production services; validate techniques in a replica env...
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Document detection opportunities and recommend telemetry to capture similar ...
DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
DPAPI masterkeys located for certain profiles
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Document detection opportunities and recommend telemetry to capture similar ...
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Preserve artifacts and copy them for offline analysis ...
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Avoid live testing against production services; validate techniques in a replica envi...
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Preserve artifacts and copy them for offline analysis ...
Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica env...
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica env...
DPAPI masterkeys located for certain profiles: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
DPAPI masterkeys located for certain profiles
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica env...
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender detection n...
DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
DPAPI masterkeys located for certain profiles
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Correlate artifacts with logs to determine timeline an...
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender detection n...
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender det...
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica env...
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender det...
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Correlate artifacts with logs to determine timeline an...
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender detection n...
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Correlate artifacts with logs to determine timeline an...
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica env...
Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender det...
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica envi...
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Correlate artifacts with logs to determine timeline an...
Potential LSASS artifacts on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Document detection opportunities and recommend telemetry to capture similar a...
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender detection n...
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Avoid live testing against production services; validate techniques in a replica envi...
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Correlate artifacts with logs to determine timeline and scope. Defender detection n...
Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Correlate artifacts with logs to determine timeline and scope. Step 4: Document detection opportunities and recommend telemetry to capture similar activity. Defender detection n...
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Avoid live testing against production services; validate techniques in a replica env...
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Avoid live testing against production services; validate techniques in a replica environment. Step 4: Correlate artifacts with logs to determine timeline an...
Potential LSASS artifacts on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Potential LSASS artifacts on host
Step 1: Confirm authorization and scope before proceeding. Step 2: Avoid live testing against production services; validate techniques in a replica environment. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Preserve artifacts and copy them for offline analysis ...
Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Browser tokens present in user profile
Step 1: Confirm authorization and scope before proceeding. Step 2: Document detection opportunities and recommend telemetry to capture similar activity. Step 3: Preserve artifacts and copy them for offline analysis in a lab. Step 4: Avoid live testing against production services; validate techniques in a replica env...
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Preserve artifacts and copy them for offline analysis in a lab. Defender detection n...
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Backups containing sensitive account data
Step 1: Confirm authorization and scope before proceeding. Step 2: Preserve artifacts and copy them for offline analysis in a lab. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica env...
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Config files referencing service credentials
Step 1: Confirm authorization and scope before proceeding. Step 2: Correlate artifacts with logs to determine timeline and scope. Step 3: Document detection opportunities and recommend telemetry to capture similar activity. Step 4: Avoid live testing against production services; validate techniques in a replica envi...