2H4CK
search
⌘Ctrlk
2H4CK
  • 🎯Home
  • 📰Artigos
    • ☁️Cloud
    • 🕵️Detection Engineering
    • 🔐Security
    • 🌐Web
    • 🪟Windows
    • 📡Wireless
  • 🚩CTF
    • 🟩Hack the Box
    • ☁️TryHackMe
  • ✏️Field Notes
    • 🐧Linux Cheat Sheet
    • 🪟Windows Cheat Sheet
  • 🖥️Labs
    • 🕸️Elastic Purple Team Lab
      • 🧠Simulações
        • 🔎Reconnaissance
        • 👨‍💻Resource Development
        • 👁️Initial Access
        • 💻Execution
        • 🚪Persistence
        • ⏫Privilege Escalation
        • 🕵️Defense Evasion
        • 🔑Credential Access
        • 🔍Discovery
        • ↔️Lateral Movement
        • 📚Collection
        • ▶️Command and Control
        • 🌐Exfiltration
        • 🛑Impact
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🖥️Labschevron-right
  2. 🕸️Elastic Purple Team Lab

🧠Simulações

Abaixo, podemos visualizar os insumos e possibilidades de detecção geradas pelas simulações no Purple Team Lab, separadas por cada tática do MITRE ATT&CK.

🔎Reconnaissancechevron-right👨‍💻Resource Developmentchevron-right👁️Initial Accesschevron-right💻Executionchevron-right🚪Persistencechevron-right⏫Privilege Escalationchevron-right🕵️Defense Evasionchevron-right🔑Credential Accesschevron-right🔍Discoverychevron-right↔️Lateral Movementchevron-right📚Collectionchevron-right▶️Command and Controlchevron-right🌐Exfiltrationchevron-right🛑Impactchevron-right
PreviousElastic Purple Team Labchevron-leftNextReconnaissancechevron-right