instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Group Policy object references embedded credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Group Policy object references embedded credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.
Step 4: Assess service and file ownerships and whether ... |
Group Policy object references embedded credentials: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Group Policy object references embedded credentials | Step 1: Confirm authorization and scope before proceeding.
Step 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.
Step 4: Assess service and file ownerships and whether ... |
Service runs as SYSTEM with writable components: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Service runs as SYSTEM with writable components | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.
Step 3: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.
Step 4: Reproduce the condition in a controlle... |
Unquoted service path suspected on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Unquoted service path suspected on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Coordinate with patching and configuration owners to plan remediation for misconfiguration findings.
Step 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 4: Assess service and file ownerships and whether ... |
Legacy Unix SUID misconfigurations present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Legacy Unix SUID misconfigurations present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.
Step 4: Coordinate with patching and configuration owners to ... |
Unquoted service path suspected on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Unquoted service path suspected on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.
Step 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 4: Coordinate with patching and configuration owners to ... |
Unquoted service path suspected on host: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Unquoted service path suspected on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Assess service and file ownerships and whether non-privileged users can alter execution paths.
Step 3: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 4: Coordinate with patching and configuration owners to ... |
Service runs as SYSTEM with writable components: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Service runs as SYSTEM with writable components | Step 1: Confirm authorization and scope before proceeding.
Step 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.
Step 4: Coordinate with patching and configuration owners to ... |
Unquoted service path suspected on host: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Unquoted service path suspected on host | Step 1: Confirm authorization and scope before proceeding.
Step 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.
Step 4: Coordinate with patching and configuration owners to ... |
Legacy Unix SUID misconfigurations present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Legacy Unix SUID misconfigurations present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Reproduce the condition in a controlled lab to validate any escalation vector safely.
Step 3: Assess service and file ownerships and whether non-privileged users can alter execution paths.
Step 4: Coordinate with patching and configuration owners to ... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Access to an internal web application that can act as pivot: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Plan low-noise lateral attemp... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Inventory reachable hosts and identify adm... |
Local admin on one host available: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Access to an internal web application that can act as pivot: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Access to an internal web application that can act as pivot | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 4: Ensure defenders capture relevant telemet... |
Valid low-priv domain user credentials present: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Valid low-priv domain user credentials present | Step 1: Confirm authorization and scope before proceeding.
Step 2: Plan low-noise lateral attempts in a lab before exercising any live action in production.
Step 3: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 4: Ensure defenders capture relevant telemet... |
Local admin on one host available: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Local admin on one host available | Step 1: Confirm authorization and scope before proceeding.
Step 2: Inventory reachable hosts and identify administrative interfaces and services used for administration.
Step 3: Ensure defenders capture relevant telemetry (authentication events, process creation, network flows).
Step 4: Plan low-noise lateral attemp... |
Domain admin compromise confirmed for lab simulation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Document removal steps and test clean-up procedures to v... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
GPO modification rights discovered for some accounts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Document removal steps and test clean-up procedures to v... |
Domain admin compromise confirmed for lab simulation: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
GPO modification rights discovered for some accounts: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Domain admin compromise confirmed for lab simulation: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 4: Document removal steps and test clean-up procedures to v... |
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Catalog potential persistence mechanisms and evalu... |
Domain admin compromise confirmed for lab simulation: In an authorized assessment, outline step-by-step lab-first evaluation and defender validation. | Domain admin compromise confirmed for lab simulation | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Long-lived service account available for assessment: Provide a detailed step-by-step red-team assessment plan (lab-first) and detection guidance for defenders. | Long-lived service account available for assessment | Step 1: Confirm authorization and scope before proceeding.
Step 2: Simulate persistence in an isolated lab and ensure the blue-team can detect the artifacts.
Step 3: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 4: Document removal steps and test clean-up procedures to v... |
GPO modification rights discovered for some accounts: What step-by-step, lab-first actions and telemetry should a red-team and blue-team collect in an authorized test? | GPO modification rights discovered for some accounts | Step 1: Confirm authorization and scope before proceeding.
Step 2: Catalog potential persistence mechanisms and evaluate forensic artifacts each creates.
Step 3: Document removal steps and test clean-up procedures to verify defenders can restore systems.
Step 4: Simulate persistence in an isolated lab and ensure the... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.