<aside> ⚠️

CLICK DUPLICATE BUTTON TO START USING THE TEMPLATE

</aside>

<aside> 🎯

Objective: Evaluate the organization's resilience against credential theft, exploitation, and lateral movement tactics used to gain domain admin or privileged access rights.

</aside>

Pre-Exercise Planning

Attack Vector Selection Matrix

Use this matrix to select the most appropriate attack vectors based on your objectives and environment:

Attack Vector Technical Complexity Detection Risk Value for Assessment Best For
Kerberoasting Medium Low High Active Directory environments
Pass-the-Hash Medium Medium Very High Testing credential caching controls
Password Spraying Low Medium-High High Testing password policies
Token Impersonation High Medium High Testing advanced Windows security
Local Admin Exploitation Medium Medium High Testing endpoint security
Cached Credential Theft Medium Low Medium Testing endpoint hardening
Service Account Abuse Medium Medium Very High Testing privileged account management

Scope Definition Framework

Target Environment Selection

Environment Type Pros Cons When to Select
Production Most realistic results Highest risk Only with extreme caution
Pre-Production/Staging Good balance of realism Moderate risk For mature security programs
Test/Development Lowest risk Less realistic Initial assessments
Isolated Lab Environment Very controlled Least realistic New testing methodologies

Access Level Starting Points

Initial Access Level Difficulty Realism Scenarios to Test
External (No Access) High Very High Full kill chain from external attack
Authenticated User Medium High Post-phishing scenario
Standard Workstation Medium High Endpoint compromise scenario
Server Access Low-Medium Medium Supply chain compromise
Cloud Resource Access Medium High Compromised API credentials

Timeline and Milestones

Execution Framework

Technical Prerequisites Checklist