Strategy: Reconnaissance

Social Engineering

Technical approaches

Breach the system

Escalate privileges

Create a backdoor

Stage Computers

Exploit Vulnerabilities