Red Team Recon
Weaponization
Password Attacks
Phishing
Enumeration
Lateral Movement and Pivoting
Data Exfiltration
Breaching Active Directory