Network Diagram
Compromised hosts and attack paths visualization
Compromised Infrastructure
Host Details
Executive Summary
Red Team Engagement Report
Engagement Overview
Attack Chain Progress
Assessment Narrative
Demonstrated Business Impact
Priority Recommendations
Top Critical Findings
Engagement Dashboard
Red team assessment overview
Findings by Severity
Findings by Phase
Attack Progression Timeline
Active C2 Sessions
Recent Activity
Findings Overview
Phase 1 — Reconnaissance
Passive OSINT and attack surface enumeration
Reconnaissance Timeline
Techniques Used
Subdomain Enumeration
Technology Stack
Findings
Phase 2 — Initial Access
Spearphishing campaigns, credential harvesting, and access establishment
Campaign Timeline
Techniques Used
Phishing Artifacts
C2 Sessions
Findings
Phase 3 — Persistence
Establishing durable access mechanisms that survive reboots, password resets, and remediation attempts
Persistence Timeline
Techniques Used
Findings
Phase 4 — Defense Evasion
Bypassing endpoint protection, suppressing telemetry, and hiding C2 communications
Evasion Timeline
Techniques Used
Findings
Phase 5 — Privilege Escalation & Lateral Movement
Escalating from user-level access to full domain compromise and cloud infrastructure
Lateral Movement Map
Attack Timeline
Techniques Used
Findings
Phase 6 — Actions on Objectives
Demonstrating business impact through data access, exfiltration simulation, and objective completion
Objective Timeline
Techniques Used
Findings
All Findings
Aggregated findings across all engagement phases, sorted by severity
Findings
MITRE ATT&CK Techniques
All techniques observed across the engagement mapped to the Enterprise ATT&CK matrix