Creating Objectives
- Navigate to Mission → Objectives
- Click Create Objective
- Define objective details
Objective Components
Title
Clear, measurable goal:
Good:
- "Gain Domain Admin privileges"
- "Access customer database"
- "Exfiltrate sensitive data from file server"
- "Establish persistence on critical systems"
Avoid:
- "Break in"
- "Get access"
- "Test security"
Description
Detailed explanation of what needs to be achieved:
## Goal
Demonstrate ability to access production database containing customer PII
## Success Criteria
- Authenticated access to database
- Ability to query customer records
- Proof of data extraction capability
## Business Impact
Demonstrates risk to customer data and regulatory compliance obligations
Priority
Importance level:
- Critical: Must achieve for engagement success
- High: Important but not required
- Medium: Nice to have
- Low: Stretch goals
Status
Current progress:
- Not Started: No progress yet
- In Progress: Actively working
- Blocked: Obstacle preventing progress
- Achieved: Successfully completed
- Abandoned: No longer pursuing
Types of Objectives
Access Objectives
Gaining specific access levels:
- User-level access to target systems
- Administrator/root privileges
- Domain Admin in AD environment
- Database access
- Cloud infrastructure access
Data Objectives
Accessing specific data:
- Customer database records
- Financial information
- Intellectual property
- Configuration files
- Source code
- Email archives
Persistence Objectives
Maintaining access:
- Create backdoor accounts
- Install persistence mechanisms
- Establish covert channels
- Maintain access post-remediation
Impact Objectives
Demonstrating potential damage:
- Data exfiltration
- Service disruption
- Privilege escalation
- Lateral movement
- System modification
Detection Objectives
Testing security controls:
- Bypass endpoint protection
- Evade IDS/IPS
- Avoid SIEM detection
- Test incident response
- Measure detection time
Tracking Progress
Status Updates
Update objective status regularly:
Not Started → In Progress:
- When you begin working toward objective
- Document initial approach
In Progress → Achieved:
- When objective is successfully completed
- Link supporting evidence
- Document achievement method
In Progress → Blocked:
- When obstacle prevents progress
- Create blocker entry
- Document what's preventing achievement
Linking to Findings
Connect objectives to discovered vulnerabilities:
- Reference objective in finding description
- Shows how finding relates to goals
- Demonstrates objective achievement
- Justifies finding severity
Evidence Collection
Attach proof of achievement:
- Screenshots showing access
- Command output
- Exfiltrated data samples
- Persistence mechanism proof
Objective-Driven Testing
Pre-Engagement Planning
Define objectives before operations begin:
- Client consultation: Understand what client wants tested
- Risk assessment: Identify high-value targets
- Threat modeling: Determine likely attack scenarios
- Objective definition: Create measurable goals
During Engagement
Use objectives to guide operations:
- Prioritize activities: Focus on objective-related tasks
- Progress tracking: Regular objective status review
- Pivoting decisions: Choose paths that advance objectives
- Time management: Balance effort across objectives
Scope Drift Detection
Objectives help identify scope drift:
Signs of drift:
- Working on tasks unrelated to any objective
- Pursuing interesting but irrelevant vulnerabilities
- Testing systems outside engagement goals
- Spending excessive time on low-priority items
Course correction:
- Review current activities against objectives
- Identify off-target work
- Refocus on objectives
- Document scope changes if needed
Reporting
Objective Achievement Summary
Reports include objective section showing:
For each objective:
- Status (Achieved/Blocked/Abandoned)
- Achievement method
- Related findings
- Supporting evidence
- Business impact demonstrated
Overall achievement:
- Percentage of objectives achieved
- Critical objectives status
- Blockers and challenges
- Lessons learned
Executive Summary Impact
Objectives link technical findings to business impact:
Objective: Access customer database containing PII
Achievement: Successfully accessed database with admin privileges
via SQL injection vulnerability (Finding-001)
Business Impact: Demonstrates risk to customer data, potential
regulatory violations (GDPR, CCPA), and reputational damage
Best Practices
SMART Objectives
Make objectives Specific, Measurable, Achievable, Relevant, Time-bound:
Specific: Clear and unambiguous
Good: "Obtain Domain Admin access in CORP.LOCAL domain"
Bad: "Get admin"
Measurable: Can verify achievement
Good: "Extract 1000 customer records from production database"
Bad: "Access some data"
Achievable: Realistic given time and resources
Good: "Escalate from user to admin on web server"
Bad: "Compromise every system in the enterprise"
Relevant: Aligned with engagement purpose
Good: "Access financial data" (for financial systems assessment)
Bad: "Access HR systems" (when testing financial applications)
Time-bound: Define when objective should be attempted
Good: "Week 1: Reconnaissance, Week 2: Initial access, Week 3: Privilege escalation"
Bad: "At some point"
Prioritization
Focus on high-value objectives first:
- Critical path: What must be achieved
- Quick wins: Easy objectives to build momentum
- Stretch goals: Ambitious objectives if time permits
- Client priorities: What client cares most about
Documentation
Document thoroughly:
When objective is achieved:
- How it was achieved
- What findings enabled it
- Evidence collected
- Timestamp of achievement
When objective is blocked:
- What prevented achievement
- What was attempted
- What would be needed
- Client notification if relevant
Common Workflows
Engagement Planning
- Meet with client to understand goals
- Create initial objective list
- Prioritize objectives (Critical/High/Medium/Low)
- Review objectives with team
- Adjust based on feasibility
- Get client approval
- Begin operations
During Operations
- Review objectives daily
- Select objective to work toward
- Plan activities to achieve objective
- Execute operations
- Update objective status
- Link findings to objectives
- Collect evidence
- Move to next objective
Handling Blockers
- Identify what's preventing objective achievement
- Create blocker entry in Tracking → Blockers
- Update objective status to "Blocked"
- Notify client if needed
- Work on other objectives
- Revisit when blocker is resolved
Report Generation
- Review all objectives
- Verify status is current
- Ensure achieved objectives have evidence
- Document blocked objectives with reasons
- Include in report's objectives section
- Link to related findings
Tips
- Define early: Create objectives before starting operations
- Client alignment: Ensure objectives match client expectations
- Measurable goals: Make success criteria clear
- Regular review: Check progress daily
- Evidence immediately: Collect proof when objectives are achieved
- Link findings: Connect vulnerabilities to objectives
- Update status: Keep status current
- Communicate blockers: Notify client of obstacles
- Prioritize realistically: Don't over-commit
- Document everything: Record what was attempted and why