• Evaluating command and control techniques used by attackers.
  • Identifying persistence techniques to maintain access.
  • Analyzing lateral movement and pivoting techniques.
  • Assessing data exfiltration and anti-forensics techniques employed by adversaries.