Tech Solvency / Red Team


Architecture/ecosystem

Recon

Credentials acquisition and usage

Inventory and classification

MS/AD

Local exploitation

Remote exploitation

Mobile

Broad-scale exploitation

Evasion

Learning/training/self-bootstrapping

Meta/lists