instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc... |
Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Prioritize targets that are likely to yield credentials or privilege... |
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu... |
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focu... |
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Prioritize targets that are likely to yield credentials or privileged acc... |
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ... |
Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the env... |
Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-... |
Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-... |
Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Prioritize targets that are likely to yield credentials or privileged acc... |
Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc... |
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc... |
Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Enumerate directory objects that are accessible and capture LDAP respons... |
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ... |
Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map t... |
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the env... |
Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain-joined VM with read access to DC info | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-foc... |
Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to a multi-share file server | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-... |
Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Enumerate directory objects that are accessible and capture LDAP response... |
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or pr... |
Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 3: Prioritize targets that are likely to yield credentials or privileged access.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the env... |
Ability to perform internal DNS queries: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ... |
Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Ability to perform internal DNS queries | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.
Step 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environm... |
Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Read-only view into asset inventory/CMDB | Step 1: Confirm authorization and scope before proceeding.
Step 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.
Step 4: Prioritize targets that are likely to yield credentials or privilege... |
Network foothold with standard user rights: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network foothold with standard user rights | Step 1: Confirm authorization and scope before proceeding.
Step 2: Prioritize targets that are likely to yield credentials or privileged access.
Step 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.
Step 4: Enumerate directory objects that are accessible and capture LDAP responses for ... |
DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | DPAPI masterkeys located for certain profiles | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Document detection opportunities and recommend telemetry to capture similar a... |
DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | DPAPI masterkeys located for certain profiles | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Document detection opportunities and recommend telemetry to capture similar a... |
Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender det... |
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Document detection opportunities and recommend telemetry to capture similar activity.
Defender detection n... |
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | DPAPI masterkeys located for certain profiles | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Avoid live testing against production services; validate techniques in a replica environment.
Defender det... |
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Document detection opportunities and recommend telemetry to capture similar ... |
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender det... |
Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender detection n... |
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Avoid live testing against production services; validate techniques in a replica environment.
Defender det... |
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Avoid live testing against production services; validate techniques in a replica environment.
Defender det... |
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Preserve artifacts and copy them for offline analysis ... |
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Correlate artifacts with logs to determine timeline an... |
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender det... |
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | DPAPI masterkeys located for certain profiles | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Document detection opportunities and recommend telemetry to capture similar a... |
Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Document detection opportunities and recommend telemetry to capture similar ... |
Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender detection n... |
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Document detection opportunities and recommend telemetry to capture similar a... |
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Preserve artifacts and copy them for offline analysis ... |
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender detection n... |
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Document detection opportunities and recommend telemetry to capture similar a... |
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender detection n... |
DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | DPAPI masterkeys located for certain profiles | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Document detection opportunities and recommend telemetry to capture similar a... |
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Document detection opportunities and recommend telemetry to capture similar ... |
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Avoid live testing against production services; validate techniques in a replica environment.
Defender det... |
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Document detection opportunities and recommend telemetry to capture similar ... |
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender det... |
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender detection n... |
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Preserve artifacts and copy them for offline analysis ... |
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender det... |
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender detection n... |
Potential LSASS artifacts on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Document detection opportunities and recommend telemetry to capture similar ... |
DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | DPAPI masterkeys located for certain profiles | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Document detection opportunities and recommend telemetry to capture similar ... |
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Preserve artifacts and copy them for offline analysis ... |
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Preserve artifacts and copy them for offline analysis ... |
Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
DPAPI masterkeys located for certain profiles: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | DPAPI masterkeys located for certain profiles | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender detection n... |
DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | DPAPI masterkeys located for certain profiles | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Correlate artifacts with logs to determine timeline an... |
Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender detection n... |
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender det... |
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender det... |
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Correlate artifacts with logs to determine timeline an... |
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender detection n... |
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Correlate artifacts with logs to determine timeline an... |
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender det... |
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Correlate artifacts with logs to determine timeline an... |
Potential LSASS artifacts on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Document detection opportunities and recommend telemetry to capture similar a... |
Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender detection n... |
Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Correlate artifacts with logs to determine timeline and scope.
Defender detection n... |
Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Correlate artifacts with logs to determine timeline and scope.
Step 4: Document detection opportunities and recommend telemetry to capture similar activity.
Defender detection n... |
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Avoid live testing against production services; validate techniques in a replica environment.
Step 4: Correlate artifacts with logs to determine timeline an... |
Potential LSASS artifacts on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Potential LSASS artifacts on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Avoid live testing against production services; validate techniques in a replica environment.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Preserve artifacts and copy them for offline analysis ... |
Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Browser tokens present in user profile | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document detection opportunities and recommend telemetry to capture similar activity.
Step 3: Preserve artifacts and copy them for offline analysis in a lab.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Preserve artifacts and copy them for offline analysis in a lab.
Defender detection n... |
Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Backups containing sensitive account data | Step 1: Confirm authorization and scope before proceeding.
Step 2: Preserve artifacts and copy them for offline analysis in a lab.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica env... |
Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Config files referencing service credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Correlate artifacts with logs to determine timeline and scope.
Step 3: Document detection opportunities and recommend telemetry to capture similar activity.
Step 4: Avoid live testing against production services; validate techniques in a replica envi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.