Do not use binaries for initial capabilitiesAs a general rule, do not drop binaries on the system. First, use builtin commands to achieve your goals. This is not always possible, and binaries
maybe required however, binaries
must be vetted,
obfuscated, and tested against detection before use.
●
Ensure all other Dos and Don’ts"
are met for all binaries●
Consult a senior operator before dropping any binary
Do not download restricted datasetsNEVER download (or remove from the target network) any PII, HIPAA, PCI, or other restricted datasets. A good rule of thumb is
to annotate the type of data, location, access method, and level of access to restricted data in the log.
●
Ensure the log notes include a reference to the type of data
discovered for quick reference●
Take a screenshot of the displayed filename and location (assuming the filename has no restricted data included)
●
Screenshot a portion of the dataset without capturing the restricted data. The operator may do so for proof of access.
●
If the data set is of concern, attempt to copy the file to anew name in the same location. This will validate access without exposing the data.
●
DO NOT take screenshots of the data itself!