Introduction

What?

Simulating hacker-style attacks on network assets to detect and exploit security misconfiguration, network vulnerabilities, and threats like open ports, vulnerable devices, or outdated software running on the network.

Why?

To build experience with threat intelligence and network penetration testing to replicate accurately a full scenario of a targeted attack against an entire organisation including people, processes and technologies.

How?