instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Plan low-noise lateral attemp...
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Plan low-noise lateral attemp...
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Inventory reachable hosts and identify adm...
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Ensure defenders capture relevant telemet...
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Inventory reachable hosts and identify adm...
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Inventory reachable hosts and identify adm...
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Inventory reachable hosts and identify adm...
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Plan low-noise lateral attemp...
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Plan low-noise lateral attemp...
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Inventory reachable hosts and identify adm...
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Inventory reachable hosts and identify adm...
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Plan low-noise lateral attemp...
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Plan low-noise lateral attemp...
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Plan low-noise lateral attemp...
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Inventory reachable hosts and identify adm...
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Plan low-noise lateral attemp...
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Inventory reachable hosts and identify adm...
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Plan low-noise lateral attemp...
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Plan low-noise lateral attemp...
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Inventory reachable hosts and identify adm...
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Plan low-noise lateral attemp...
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Ensure defenders capture relevant telemet...
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Inventory reachable hosts and identify adm...
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Inventory reachable hosts and identify adm...
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Inventory reachable hosts and identify adm...
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Inventory reachable hosts and identify adm...
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Ensure defenders capture relevant telemet...
Valid low-priv domain user credentials present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Access to an internal web application that can act as pivot
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Ensure defenders capture relevant telemet...
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 4: Ensure defenders capture relevant telemet...
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Valid low-priv domain user credentials present
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production. Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 4: Ensure defenders capture relevant telemet...
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Local admin on one host available
Step 1: Confirm authorization and scope before proceeding. Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration. Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows). Step 4: Plan low-noise lateral attemp...
Domain admin compromise confirmed for lab simulation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Catalog potential persistence mechanisms and evalu...
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Document removal steps and test clean-up procedures to v...
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Simulate persistence in an isolated lab and ensure the...
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Document removal steps and test clean-up procedures to v...
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Catalog potential persistence mechanisms and evalu...
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Simulate persistence in an isolated lab and ensure the...
GPO modification rights discovered for some accounts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Catalog potential persistence mechanisms and evalu...
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Document removal steps and test clean-up procedures to v...
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Document removal steps and test clean-up procedures to v...
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Simulate persistence in an isolated lab and ensure the...
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Document removal steps and test clean-up procedures to v...
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Simulate persistence in an isolated lab and ensure the...
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Catalog potential persistence mechanisms and evalu...
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Simulate persistence in an isolated lab and ensure the...
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Simulate persistence in an isolated lab and ensure the...
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Catalog potential persistence mechanisms and evalu...
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Document removal steps and test clean-up procedures to v...
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Document removal steps and test clean-up procedures to v...
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Simulate persistence in an isolated lab and ensure the...
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Document removal steps and test clean-up procedures to v...
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Catalog potential persistence mechanisms and evalu...
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
GPO modification rights discovered for some accounts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Document removal steps and test clean-up procedures to v...
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Simulate persistence in an isolated lab and ensure the...
Domain admin compromise confirmed for lab simulation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Catalog potential persistence mechanisms and evalu...
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 4: Document removal steps and test clean-up procedures to v...
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Simulate persistence in an isolated lab and ensure the...
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Document removal steps and test clean-up procedures to v...
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Catalog potential persistence mechanisms and evalu...
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Domain admin compromise confirmed for lab simulation
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Simulate persistence in an isolated lab and ensure the...
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Simulate persistence in an isolated lab and ensure the...
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Long-lived service account available for assessment
Step 1: Confirm authorization and scope before proceeding. Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts. Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 4: Document removal steps and test clean-up procedures to v...
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
GPO modification rights discovered for some accounts
Step 1: Confirm authorization and scope before proceeding. Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates. Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems. Step 4: Simulate persistence in an isolated lab and ensure the...
EDR product blocking common tooling: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
EDR product blocking common tooling
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Work with defenders to unders...
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Assess which telemetry sources a...
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Assess which telemetry sources a...
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 4: Plan lab-based experiments to eva...
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Plan lab-based experiments to eva...
EDR product blocking common tooling: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
EDR product blocking common tooling
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Work with defenders to unders...
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Plan lab-based experiments to eva...
Network IDS with strict thresholds: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Assess which telemetry sources a...
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Plan lab-based experiments to eva...
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Assess which telemetry sources a...
EDR product blocking common tooling: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
EDR product blocking common tooling
Step 1: Confirm authorization and scope before proceeding. Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 4: Plan lab-based experiments to eva...
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Plan lab-based experiments to eva...
Network IDS with strict thresholds: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Work with defenders to unders...
Network IDS with strict thresholds: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Network IDS with strict thresholds
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 4: Work with defenders to unders...
EDR product blocking common tooling: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
EDR product blocking common tooling
Step 1: Confirm authorization and scope before proceeding. Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Assess which telemetry sources a...
Host-level script execution control enabled: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test?
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 4: Plan lab-based experiments to eva...
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Plan lab-based experiments to eva...
Host-level script execution control enabled: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Work with defenders to understand detection logic and provide labeled samples for rule refinement. Step 4: Plan lab-based experiments to eva...
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 3: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 4: Work with defenders to unders...
Host-level script execution control enabled: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders.
Host-level script execution control enabled
Step 1: Confirm authorization and scope before proceeding. Step 2: Assess which telemetry sources are capturing blocking events and identify false positives for tuning. Step 3: Plan lab-based experiments to evaluate stealth approaches without bypassing protections in production. Step 4: Work with defenders to unders...