Adversary Emulation, Evasion and Custom Tradecraft // Field Brief

Client-Side Chaining

Documents, browsers, installers and user-mediated execution paths as an offensive chain.

field briefoperator referencepublic sources

Why this topic matters

Client-side chains matter because many environments still trust user-mediated actions far more than they trust direct service-side execution. Browsers, documents, installers and collaboration tools create legitimacy that pure payload delivery often lacks.

Operator checks

  • Model what the user sees, what the OS trusts and what the defender will log.
  • Treat archives, document templates, installers and remote-management tools as trust carriers.
  • Check whether the chain changes from user execution to durable foothold or merely to one short-lived action.
  • Report how the trust narrative works, not only what code ran.

Reporting lens

Write findings in terms of trust crossed, scope enlarged and business or operational effect reached. That keeps the note useful whether you are validating a lab, an internal research target or a live customer environment.

Curated public references