Tech Solvency / Red Team


Architecture/ecosystem

Recon

Credentials acquisition and usage

Inventory and classification

Microsoft/AD

Local exploitation

Web exploitation

Remote exploitation

Mobile

Broad-scale exploitation

Pivoting and lateral movement

Evasion

Learning/training/self-bootstrapping

Infrastructure

Meta/lists