Simulation Control
Legitimate Actions
Enumeration & Discovery
Initial Access & Credential Attacks
Known Vulnerabilities
Privilege Escalation
Lateral Movement
Certificate & PKI Attacks (AD CS)
Domain Compromise & Persistence
Legend
DC
CA
User
Admin
Service Acct
Workstation
Server
Attacker

Kerberos
LDAP
DRSUAPI
RPC
SMB
NTLM
DNS
HTTP(S)
Attack Flow
Simulation Log