instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Domain admin compromise confirmed for lab simulation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Document removal steps and test clean-up procedures to v... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
GPO modification rights discovered for some accounts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Document removal steps and test clean-up procedures to v... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Domain admin compromise confirmed for lab simulation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
EDR product blocking common tooling: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Assess which telemetry sources a... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Assess which telemetry sources a... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
EDR product blocking common tooling: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Assess which telemetry sources a... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Assess which telemetry sources a... |
EDR product blocking common tooling: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Plan lab-based experiments to eva... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Network IDS with strict thresholds: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Network IDS with strict thresholds | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
EDR product blocking common tooling: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | EDR product blocking common tooling | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Assess which telemetry sources a... |
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement.
Step 4: Plan lab-based experiments to eva... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 4: Work with defenders to unders... |
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Host-level script execution control enabled | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning.
Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production.
Step 4: Work with defenders to unders... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.