Rooms
Red Teaming
Use diverse techniques for initial access
Enumerate and persist on targets
Evade security solutions
Exploit Active Directory
Blue Teaming
Detect threats
Gather threat actor intelligence
Understand and emulate adversary TTPs
Identify and respond to incidents
Security Analyst
Monitor and investigate alerts
Configure and manage security tools
Develop and implement IDS signatures
Escalate the security incidents to the higher team if needed