Focus
Focus areas
- Step 1
Preparing the attack with advanced social engineering, client-side manipulation, spear phishing, macro abuse, process spoofing, and obfuscated payload delivery so every engagement starts with a human factor focus.
- Step 2
Red teaming Active Directory through advanced reconnaissance, PowerShell/ C2 automation (Covenant, Empire), enumeration, credential theft, and lateral movement techniques that mirror domain dominance missions.
- Step 3
Targeting critical domain infrastructure by abusing SQL Server, Exchange, WSUS, and service dependencies to escalate privileges and pivot inside hardened enterprises.
- Step 4
Evasion labs that cover AMSI/EDR bypassing, logging suppression, discovery management, and stealthy persistence strategies defenders rely on in production.