File size: 499,490 Bytes
fa919de | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 | {"instruction": "Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Stolen VPN credential allowing remote access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Public-facing web app with possible misconfiguration", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "User opened document with embedded macro", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Supplier/third-party compromise suspected", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Supplier/third-party compromise suspected", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "User opened document with embedded macro", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Exposed remote management interface reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Supplier/third-party compromise suspected: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Supplier/third-party compromise suspected", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Supplier/third-party compromise suspected", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "User opened document with embedded macro", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 3: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Stolen VPN credential allowing remote access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "User opened document with embedded macro", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Exposed remote management interface reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Exposed remote management interface reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "User opened document with embedded macro", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Public-facing web app with possible misconfiguration", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "User opened document with embedded macro: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "User opened document with embedded macro", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Phishing foothold on user workstation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Stolen VPN credential allowing remote access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Stolen VPN credential allowing remote access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Exposed remote management interface reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Exposed remote management interface reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Stolen VPN credential allowing remote access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Public-facing web app with possible misconfiguration: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Public-facing web app with possible misconfiguration", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "User opened document with embedded macro: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "User opened document with embedded macro", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Exposed remote management interface reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Exposed remote management interface reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Supplier/third-party compromise suspected: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Supplier/third-party compromise suspected", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Stolen VPN credential allowing remote access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Search non-destructively for credential material in user profiles and browser stores.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Supplier/third-party compromise suspected: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Supplier/third-party compromise suspected", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Public-facing web app with possible misconfiguration: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Public-facing web app with possible misconfiguration", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "User opened document with embedded macro: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "User opened document with embedded macro", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Phishing foothold on user workstation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Phishing foothold on user workstation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Compromised webmail session token obtained: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Compromised webmail session token obtained", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 3: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 4: Map the local network perspective and identify what domain resources are reachable.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 3: Enumerate visible services and shares without altering state to avoid noisy detection.\n\nStep 4: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "OAuth app consent token acquired: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "OAuth app consent token acquired", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Map the local network perspective and identify what domain resources are reachable.\n\nStep 3: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nStep 4: Search non-destructively for credential material in user profiles and browser stores.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Stolen VPN credential allowing remote access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Stolen VPN credential allowing remote access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with defenders to capture telemetry for each test to validate detection capabilities.\n\nStep 3: Map the local network perspective and identify what domain resources are reachable.\n\nStep 4: Assess potential for lateral movement from this host and prioritize targets accordingly.\n\nDefender detection notes:\n\n - Unusual inbound/external sessions, new device profiles in VPN logs.\n\n - EDR alerts on document macro execution or unknown process creation.\n\nMitigations & hardening:\n\n - Enforce phishing-resistant MFA and stricter session controls.\n\n - Harden endpoints and restrict execution of macros from untrusted sources.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain-joined VM with read access to DC info: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain-joined VM with read access to DC info", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to a multi-share file server: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to a multi-share file server", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 3: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Ability to perform internal DNS queries: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Ability to perform internal DNS queries", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Identify critical hosts (DCs, CAs, backup servers) and plan lab-focused follow-ups.\n\nStep 4: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Read-only view into asset inventory/CMDB: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Read-only view into asset inventory/CMDB", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 3: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nStep 4: Prioritize targets that are likely to yield credentials or privileged access.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network foothold with standard user rights: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Network foothold with standard user rights", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prioritize targets that are likely to yield credentials or privileged access.\n\nStep 3: Use passive discovery sources first (DNS, ARP, CMDB) to map the environment.\n\nStep 4: Enumerate directory objects that are accessible and capture LDAP responses for analysis.\n\nDefender detection notes:\n\n - Increased LDAP or DNS query patterns from an atypical host.\n\n - Access to internal inventory systems from non-standard accounts.\n\nMitigations & hardening:\n\n - Restrict directory query capabilities and monitor access to inventory systems.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "DPAPI masterkeys located for certain profiles", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "DPAPI masterkeys located for certain profiles", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "DPAPI masterkeys located for certain profiles", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "DPAPI masterkeys located for certain profiles", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "DPAPI masterkeys located for certain profiles", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "DPAPI masterkeys located for certain profiles: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "DPAPI masterkeys located for certain profiles", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "DPAPI masterkeys located for certain profiles: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "DPAPI masterkeys located for certain profiles", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "DPAPI masterkeys located for certain profiles: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "DPAPI masterkeys located for certain profiles", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Correlate artifacts with logs to determine timeline and scope.\n\nStep 4: Document detection opportunities and recommend telemetry to capture similar activity.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 4: Correlate artifacts with logs to determine timeline and scope.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Potential LSASS artifacts on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Potential LSASS artifacts on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Avoid live testing against production services; validate techniques in a replica environment.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Browser tokens present in user profile: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Browser tokens present in user profile", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 3: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Preserve artifacts and copy them for offline analysis in a lab.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Backups containing sensitive account data: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Backups containing sensitive account data", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Preserve artifacts and copy them for offline analysis in a lab.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Config files referencing service credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Config files referencing service credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate artifacts with logs to determine timeline and scope.\n\nStep 3: Document detection opportunities and recommend telemetry to capture similar activity.\n\nStep 4: Avoid live testing against production services; validate techniques in a replica environment.\n\nDefender detection notes:\n\n - Unusual process memory access or credential-dump related telemetry.\n\n - Unexpected access to backup or config repositories.\n\nMitigations & hardening:\n\n - Apply Credential Guard, limit backup access, and harden DPAPI storage.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Accounts flagged with no-preauth: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Accounts flagged with no-preauth", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Accounts flagged with no-preauth: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Accounts flagged with no-preauth", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Accounts flagged with no-preauth: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Accounts flagged with no-preauth", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service Principal Names (SPNs) enumerated: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Service Principal Names (SPNs) enumerated", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Accounts flagged with no-preauth: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Accounts flagged with no-preauth", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 3: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Cross-forest trust relationships exist: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Cross-forest trust relationships exist", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Accounts flagged with no-preauth: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Accounts flagged with no-preauth", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nStep 4: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Constrained delegation entries present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Constrained delegation entries present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Use lab simulations to test detection of Kerberos anomalies without exploiting live systems.\n\nStep 3: Catalogue accounts and SPNs to estimate risk and likely attack surface.\n\nStep 4: Validate ticket lifetime policies and monitor for abnormal ticket requests.\n\nDefender detection notes:\n\n - Abnormal increases in ticket requests or requests for uncommon services.\n\nMitigations & hardening:\n\n - Enable pre-auth where feasible and enforce short ticket lifetimes.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Group Policy object references embedded credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Group Policy object references embedded credentials", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 4: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Service runs as SYSTEM with writable components: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Service runs as SYSTEM with writable components", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unquoted service path suspected on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unquoted service path suspected on host", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Legacy Unix SUID misconfigurations present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Legacy Unix SUID misconfigurations present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.\n\nStep 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.\n\nStep 4: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.\n\nDefender detection notes:\n\n - Unusual modifications to service binaries or creation of new scheduled tasks.\n\nMitigations & hardening:\n\n - Apply least-privilege to services, fix unquoted paths, and enforce code signing.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Access to an internal web application that can act as pivot", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Valid low-priv domain user credentials present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nStep 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 4: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Local admin on one host available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.\n\nStep 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).\n\nStep 4: Plan low-noise lateral attempts in a lab before exercising any live action in production.\n\nDefender detection notes:\n\n - Unusual remote process execution patterns across multiple hosts.\n\n - Authentication events from uncommon source hosts for user accounts.\n\nMitigations & hardening:\n\n - Restrict legacy administrative protocols and enforce modern authentication.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Domain admin compromise confirmed for lab simulation", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Long-lived service account available for assessment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nStep 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 4: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "GPO modification rights discovered for some accounts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.\n\nStep 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.\n\nStep 4: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.\n\nDefender detection notes:\n\n - Changes to group policies, replication anomalies, or strange certificate issuance events.\n\nMitigations & hardening:\n\n - Harden GPO authorizations, monitor for unauthorized changes, and enforce change control on privileged actions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "EDR product blocking common tooling: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "EDR product blocking common tooling", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "EDR product blocking common tooling: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "EDR product blocking common tooling", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "EDR product blocking common tooling: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "EDR product blocking common tooling", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "EDR product blocking common tooling: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "EDR product blocking common tooling", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Network IDS with strict thresholds: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Network IDS with strict thresholds", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "EDR product blocking common tooling: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "EDR product blocking common tooling", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nStep 4: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Host-level script execution control enabled", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.\n\nStep 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.\n\nStep 4: Work with defenders to understand detection logic and provide labeled samples for rule refinement.\n\nDefender detection notes:\n\n - Alerts for script blocking or process termination logged by EDR.\n\nMitigations & hardening:\n\n - Keep endpoint protections up to date; use allowlisting and strong application control policies.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 4: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 4: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 4: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Need to simulate ransomware-style impact: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Need to simulate ransomware-style impact", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nStep 4: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Limited egress bandwidth environment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Limited egress bandwidth environment", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 3: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large sensitive dataset present on fileshare: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Large sensitive dataset present on fileshare", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan mock impact exercises that demonstrate potential business impacts without destructive actions.\n\nStep 3: Validate blue-team detection of suspicious data aggregation and unusual outbound patterns.\n\nStep 4: Simulate staging of data within an isolated lab, capturing file access and process telemetry.\n\nDefender detection notes:\n\n - Large sequential file reads from atypical accounts or hosts.\n\n - Anomalous outbound connections to unknown external endpoints or DNS tunneling patterns.\n\nMitigations & hardening:\n\n - Enforce DLP rules for sensitive file access and restrict direct outbound connections from critical hosts.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Azure AD tenant with conditional access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD tenant with conditional access: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Azure AD tenant with conditional access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Azure AD tenant with conditional access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD tenant with conditional access: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Azure AD tenant with conditional access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD tenant with conditional access: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Azure AD tenant with conditional access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "M365 tenant with many apps and OAuth consents: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "M365 tenant with many apps and OAuth consents", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 3: Enumerate identity and application configuration in a read-only manner.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD tenant with conditional access: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Azure AD tenant with conditional access", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate identity and application configuration in a read-only manner.\n\nStep 3: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 4: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Azure AD Connect server present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Azure AD Connect server present", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Plan lab-based OAuth/consent simulations to help defenders tune detections.\n\nStep 3: Validate multi-factor and conditional access coverage for high-risk accounts.\n\nStep 4: Enumerate identity and application configuration in a read-only manner.\n\nDefender detection notes:\n\n - Unusual token issuance or refresh patterns in identity logs.\n\nMitigations & hardening:\n\n - Harden app consent policies, require admin consent for high-privilege scopes, and monitor identity logs.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "SCCM site with many distribution points", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nStep 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "SCCM admin console reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nStep 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "SCCM site with many distribution points", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nStep 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM admin console reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "SCCM admin console reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nStep 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM site with many distribution points: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "SCCM site with many distribution points", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nStep 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "SCCM admin console reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nStep 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM admin console reachable: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "SCCM admin console reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nStep 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM admin console reachable: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "SCCM admin console reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nStep 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM admin console reachable: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "SCCM admin console reachable", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nStep 3: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "SCCM site with many distribution points: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "SCCM site with many distribution points", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Simulate client push or package deployment workflows in lab to validate detection and access controls.\n\nStep 3: Inventory SCCM roles and distribution point capabilities and document secrets exposure possibilities.\n\nDefender detection notes:\n\n - Unexpected package deployments or changes in SCCM job logs.\n\nMitigations & hardening:\n\n - Restrict access to SCCM roles and harden distribution point permissions.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Enterprise CA present with many templates: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Enterprise CA present with many templates", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate who has enrollment rights and whether those rights are excessive.\n\nStep 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Web enrollment services available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nStep 3: Validate who has enrollment rights and whether those rights are excessive.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Web enrollment services available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate who has enrollment rights and whether those rights are excessive.\n\nStep 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Web enrollment services available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Web enrollment services available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nStep 3: Validate who has enrollment rights and whether those rights are excessive.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Web enrollment services available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nStep 3: Validate who has enrollment rights and whether those rights are excessive.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Enterprise CA present with many templates: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Enterprise CA present with many templates", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nStep 3: Validate who has enrollment rights and whether those rights are excessive.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Enterprise CA present with many templates: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Enterprise CA present with many templates", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate who has enrollment rights and whether those rights are excessive.\n\nStep 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Web enrollment services available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nStep 3: Validate who has enrollment rights and whether those rights are excessive.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Web enrollment services available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Web enrollment services available", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate who has enrollment rights and whether those rights are excessive.\n\nStep 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Enterprise CA present with many templates: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Enterprise CA present with many templates", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Validate who has enrollment rights and whether those rights are excessive.\n\nStep 3: Enumerate CA templates and identify which allow client auth or on-behalf-of enrollment.\n\nDefender detection notes:\n\n - Unusual certificate issuance or renewal outside of maintenance windows.\n\nMitigations & hardening:\n\n - Harden CA role membership, restrict template edit/issue rights, and audit certificate issuance.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Anomalous certificate issuance logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Anomalous certificate issuance logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Anomalous certificate issuance logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Anomalous certificate issuance logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Anomalous certificate issuance logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Anomalous certificate issuance logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Anomalous certificate issuance logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Anomalous certificate issuance logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Anomalous certificate issuance logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Anomalous certificate issuance logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Anomalous certificate issuance logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Anomalous certificate issuance logs: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Anomalous certificate issuance logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Unexpected use of administrative utilities across many hosts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?", "input": "Unexpected use of administrative utilities across many hosts", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nStep 3: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 4: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Large-scale LDAP brute force attempts detected in logs: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Large-scale LDAP brute force attempts detected in logs", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Correlate across telemetry (network, EDR, authentication logs) to determine scope.\n\nStep 3: Triage the affected logs and extract indicators (source IP, account, timing) for hunting.\n\nStep 4: Tune detection rules with labeled data from lab reproductions to reduce false positives.\n\nDefender detection notes:\n\n - Recurring patterns of similar failed authentication across many accounts.\n\nMitigations & hardening:\n\n - Implement cross-source correlation, logging retention, and analytic playbooks for common attack flows.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Coordinating blue-team telemetry collection: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Coordinating blue-team telemetry collection", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 3: Define clear scope, rules of engagement, and escalation contacts.\n\nStep 4: Establish emergency stop procedures and communication channels.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Define clear scope, rules of engagement, and escalation contacts.\n\nStep 3: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 4: Establish emergency stop procedures and communication channels.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Define clear scope, rules of engagement, and escalation contacts.\n\nStep 3: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 4: Establish emergency stop procedures and communication channels.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 3: Establish emergency stop procedures and communication channels.\n\nStep 4: Define clear scope, rules of engagement, and escalation contacts.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 3: Establish emergency stop procedures and communication channels.\n\nStep 4: Define clear scope, rules of engagement, and escalation contacts.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 3: Establish emergency stop procedures and communication channels.\n\nStep 4: Define clear scope, rules of engagement, and escalation contacts.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 3: Establish emergency stop procedures and communication channels.\n\nStep 4: Define clear scope, rules of engagement, and escalation contacts.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 3: Establish emergency stop procedures and communication channels.\n\nStep 4: Define clear scope, rules of engagement, and escalation contacts.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 3: Define clear scope, rules of engagement, and escalation contacts.\n\nStep 4: Establish emergency stop procedures and communication channels.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
{"instruction": "Red-team exercise kickoff: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.", "input": "Red-team exercise kickoff", "output": "Step 1: Confirm authorization and scope before proceeding.\n\nStep 2: Prepare lab-based rehearsal that mirrors production for high-risk actions.\n\nStep 3: Establish emergency stop procedures and communication channels.\n\nStep 4: Define clear scope, rules of engagement, and escalation contacts.\n\nDefender detection notes:\n\n - Ensure logging/configuration is preserved for post-exercise analysis.\n\nMitigations & hardening:\n\n - Document and obtain written authorizations before activities.\n\nNote: High-level, non-actionable guidance intended for authorized lab assessments and defender tuning."}
|