Step-by-step attack runbooks¶
The preceding sections describe techniques. These playbooks describe how to run them on an actual engagement: what to prepare, what to set up, what to do in sequence, and what to do when something does not go to plan.
Each playbook covers one attack chain from planning through execution to evidence collection. They assume you have a signed scope of work and a clear brief. They do not include anything useful for someone operating without authorisation.