ASTRA Methodology

Six phases. Sequential with one exception.


Phase Sequence

Phases A through E are sequential — each produces intelligence that the next phase requires. Phase F is non-linear. It operates in two modes that wrap around the engagement cycle:

F (pre-engagement) → informs → D (decision) → E (engagement)
                                                     ↓
                                              F (post-engagement)
  • Pre-engagement intelligence (Phase F, Mode 1): Firmware extraction, reverse engineering, vulnerability discovery. This must be completed before Phase D can produce reliable countermeasure recommendations.
  • Post-engagement forensics (Phase F, Mode 2): Mission log recovery, component attribution, operational intelligence. This follows Phase E when a platform is recovered.

Specter (continuous passive collection) runs across all phases as a persistent thread — not just during Phase A.


Phases

Phase Name Output Feeds
A Detection RF, acoustic, radar signatures Phase B classification
B Identification Platform type, firmware version, protocol stack Phase C tracking parameters, Phase D vulnerability profile
C Tracking Position, bearing, velocity estimates Phase E targeting data
D Decision Ranked countermeasure list with success probability Phase E engagement plan
E Engagement Countermeasure execution, measured results Database update, Phase F post-engagement
F Exploitation Pre: vulnerability intelligence. Post: attribution data Pre feeds D and E. Post feeds intelligence analysis

Relationship to Technique Categories

The six phases describe when and in what order. The five technique categories (Specter, Mirage, Fracture, Override, Sever) describe what kind of action. They are orthogonal:

  • Phase A (Detection) primarily employs Specter techniques
  • Phase E (Engagement) employs Mirage, Fracture, Override, or Sever depending on the target
  • Specter runs continuously across all phases — it provides real-time feedback during engagement and maintains environmental awareness between engagements

The phases are a timeline. The technique categories are a toolbox. Phase D selects from the toolbox based on what the timeline has revealed.


Table of contents


© 2026 Deep Woods Security. ASTRA is an open methodology. Use it. Extend it. Cite it.

This site uses Just the Docs, a documentation theme for Jekyll.