Part I: Foundations and Governance. Chapter 1: Introduction & Scope. 1.1 Purpose & Goals Evaluation Matrix. 1.2 Engagement Type Selection Matrix. 1.3 Scope Definition Framework.
1.4 Stakeholder Alignment Assessment. 1.5 Critical Evaluation Questions. 1.6 Red Flags in Engagement Planning. Chapter 2: Governance & Rules of Engagement. 2.
1 Legal Authorization Framework. 2.2 Compliance and Regulatory Mastery. 2.3 Ethical Boundaries Assessment. 2.4 Permitted Techniques Evaluation Framework. 2.
5 Engagement Management Excellence. 2.6 Red Flags in Governance and RoE. 2.7 Governance Evaluation Checklist. 2.8 Excellence Indicators in Governance. Part II: Technical Evaluation Framework.
Chapter 3: Initial Access & Reconnaissance. 3.1 Goals & Methodologies. 3.2 OSINT & External Recon. 3.3 Social Engineering & Multi-Vector Attack Assessment. 3.
4 Network & Web Reconnaissance Techniques. 3.5 Cloud-Focused Reconnaissance. 3.6 DevOps & Supply Chain Targeting. 3.7 WAF Evasion Assessment. 3.
8 EDR & Security Tool Evasion Evaluation. 3.9 Practical Assessment Guide: Reconnaissance Phase. Chapter 4: Credential Access & Harvesting. 4.1 Goals & Techniques. 4.2 Windows Credential Dumping.
4.3 Kerberos and Active Directory Attacks. 4.4 Cloud Credential Harvesting. 4.5 Session Hijacking & Modern Token Theft. 4.6 Password Attacks & Credential Reuse.
4.7 Ethical & Operational Considerations. 4.8 Red Flags in Credential Harvesting. 4.9 Case Study: Credential Harvesting Excellence. Chapter 5: Privilege Escalation & Lateral Movement. 5.
1 Assessment Criteria & Methodologies. 5.2 Windows Privilege Escalation Assessment. 5.3 Linux Privilege Escalation Assessment. 5.4 Lateral Movement Strategies. 5.
5 Advanced Movement Techniques. 5.6 Detection and Prevention Testing. 5.7 Case Study: The Manufacturing Meltdown. Chapter 6: Security Control Evasion. 6.1 Evaluation Criteria & Methodologies.
6.2 AMSI Bypass Assessment. 6.3 Process Injection Techniques Evaluation. 6.4 ETW Bypass Assessment. 6.5 Advanced Credential Protection Bypass.
6.6 Network Security Evasion. 6.7 Comprehensive Verification Questions. 6.8 Case Study: The EDR Gauntlet. Chapter 7: Persistence & Post-Exploitation. 7.
1 Assessment Framework & Methodologies. 7.2 Windows Persistence Techniques Evaluation. 7.3 Linux/macOS Persistence Assessment. 7.4 Cloud Persistence Mechanism Evaluation. Part III: Specialized Assessments.
Chapter 8: Cloud Security Assessments. 8.1 Cloud Assessment Framework. 8.2 AWS-Specific Techniques Evaluation. 8.3 Azure-Specific Techniques Assessment. 8.
4 GCP-Specific Techniques Evaluation. 8.6 Detection & Mitigation Evaluation. 8.7 Case Study: Cloud Security Assessment. Chapter 9: Container & Kubernetes Security Assessment. 9.1 Container Assessment Methodology.
9.2 Docker Security Evaluation. 9.3 Kubernetes Security Assessment. 9.4 Tool Evaluation for Container Security. 9.5 Real-World Scenario Assessment.
9.6 Detection & Mitigation Evaluation. 9.7 Case Study: Container Security Assessment. Chapter 10: Advanced Active Directory & Windows Attacks. 10.1 AD Assessment Framework. 10.
2 AD Exploitation Tactics Evaluation. 10.3 Advanced Lateral Movement Assessment. 10.4 Detection & Mitigation Evaluation. 10.5 Comprehensive Verification Checklist. 10.
6 Case Study: AD Security Assessment. Chapter 11: Specialized Attack Vectors. 11.1 Supply Chain Assessment Framework. 11.2 ICS/SCADA Security Evaluation. 11.3 DevOps & CI/CD Pipeline Assessment.
11.4 Insider Threat Simulation Evaluation. 11.5 Specialized Detection & Mitigation. 11.6 Case Study: Supply Chain Assessment. Chapter 12: Advanced Techniques & Custom Development. 12.
1 Custom Tool Development Assessment. 12.2 Living off the Land (LOLBins) Techniques. 12.3 EDR Hooking & Evasion Evaluation. 12.4 Traffic Obfuscation Assessment. 12.
5 Detection & Mitigation Evaluation. 12.6 Case Study: Advanced Technique Assessment. Part IV: Operational Excellence. Chapter 13: The Operational Excellence Matrix. Chapter 14: The Value Demonstration Framework. Chapter 15: The Final Assessment Checklist. Appendix A: Red Team Rules of Engagement Template.