- Evaluating command and control techniques used by attackers.
- Identifying persistence techniques to maintain access.
- Analyzing lateral movement and pivoting techniques.
- Assessing data exfiltration and anti-forensics techniques employed by adversaries.