Section 31 Section 31
Client Portal
Log in to view your engagement
Enter your authenticator code
Set Up Two-Factor Authentication
Your account does not have MFA enabled. Add an authenticator app to protect your account.
Scan this QR code with your authenticator app (Google Authenticator, Authy, 1Password, etc.):
Or enter this key manually:
Save these recovery codes in a secure location. Each code can only be used once.
Section 31 Section 31
Engagement
■ Dashboard
Phases
01 Reconnaissance
02 Initial Access
03 Persistence
04 Evasion
05 Priv Esc & Lateral
06 Actions on Obj.
Analysis
🕸️ Network Diagram
📄 Executive Summary
🚩 All Findings
🎯 MITRE ATT&CK
JC
—
—
Sign out
Restart Tour
🔍

Network Diagram

Compromised hosts and attack paths visualization

Compromised Infrastructure

Active C2
Dead Session
Active/Idle Node
Dead Node

Host Details

Click a node in the diagram above to view host details.

Executive Summary

Red Team Engagement Report

Engagement Overview

——

Attack Chain Progress

Assessment Narrative

Demonstrated Business Impact

Priority Recommendations

Top Critical Findings

Engagement Dashboard

Red team assessment overview

—

ID
Start
End
Target
Scope
—

Findings by Severity

0
Total

Findings by Phase

Attack Progression Timeline

Reconnaissance
Initial Access
Critical Events
Step 0 of 0

Active C2 Sessions

Recent Activity

Findings Overview

Phase 1 — Reconnaissance

Passive OSINT and attack surface enumeration

Reconnaissance Timeline

Known Vulnerabilities

CVEs identified via Shodan and NVD for this target's infrastructure and vendor software.

Techniques Used

Subdomain Enumeration

Technology Stack

Findings

Phase 2 — Initial Access

Spearphishing campaigns, credential harvesting, and access establishment

Campaign Timeline

Techniques Used

Phishing Artifacts

C2 Sessions

Findings

Phase 3 — Persistence

Establishing durable access mechanisms that survive reboots, password resets, and remediation attempts

Persistence Timeline

Techniques Used

Findings

Phase 4 — Defense Evasion

Bypassing endpoint protection, suppressing telemetry, and hiding C2 communications

Evasion Timeline

Techniques Used

Findings

Phase 5 — Privilege Escalation & Lateral Movement

Escalating from user-level access to full domain compromise and cloud infrastructure

Lateral Movement Map

Attack Timeline

Techniques Used

Findings

Phase 6 — Actions on Objectives

Demonstrating business impact through data access, exfiltration simulation, and objective completion

Objective Timeline

Techniques Used

Findings

All Findings

Aggregated findings across all engagement phases, sorted by severity

Findings

MITRE ATT&CK Techniques

All techniques observed across the engagement mapped to the Enterprise ATT&CK matrix

Enterprise Matrix