Red Teaming Tools and Techniques
- Social Engineering: Phishing, spear-phishing, pretexting.
- Network Exploitation: Scanning, enumeration, vulnerability exploitation.
- Web Application Testing: SQL injection, cross-site scripting (XSS).
- Password Cracking: Dictionary attacks, brute-forcing.
- Malware and C2: Command and control (C2) simulations.