2H4CK
Ctrlk
  • 🎯Home
  • 📰Artigos
    • ☁️Cloud
    • 🕵️Detection Engineering
    • 🔐Security
    • 🌐Web
    • 🪟Windows
    • 📡Wireless
  • 🚩CTF
    • 🟩Hack the Box
    • ☁️TryHackMe
  • ✏️Field Notes
    • 🐧Linux Cheat Sheet
    • 🪟Windows Cheat Sheet
  • 🖥️Labs
    • 🕸️Elastic Purple Team Lab
      • 🧠Simulações
        • 🔎Reconnaissance
        • 👨‍💻Resource Development
        • 👁️Initial Access
        • 💻Execution
        • 🚪Persistence
        • ⏫Privilege Escalation
        • 🕵️Defense Evasion
        • 🔑Credential Access
        • 🔍Discovery
        • ↔️Lateral Movement
        • 📚Collection
        • ▶️Command and Control
        • 🌐Exfiltration
        • 🛑Impact
Powered by GitBook
On this page
  1. 🖥️Labs
  2. 🕸️Elastic Purple Team Lab

🧠Simulações

Abaixo, podemos visualizar os insumos e possibilidades de detecção geradas pelas simulações no Purple Team Lab, separadas por cada tática do MITRE ATT&CK.

🔎Reconnaissance👨‍💻Resource Development👁️Initial Access💻Execution🚪Persistence⏫Privilege Escalation🕵️Defense Evasion🔑Credential Access🔍Discovery↔️Lateral Movement📚Collection▶️Command and Control🌐Exfiltration🛑Impact
PreviousElastic Purple Team LabNextReconnaissance