Tech Solvency / Red team


Architecture/ecosystem

Recon

Credentials acquisition and usage

Inventory and classification

MS/AD

Local exploitation

Broad-scale exploitation

Evasion

Learning/training/self-bootstrapping

Meta/lists