Tech Solvency / Red team


Recon

Credentials acquisition and usage

Inventory and classification

MS/AD

Local exploitation

Broad-scale exploitation

Evasion