> .ROLE
PENETRATION TESTER, CYBERSECURITY CONSULTANT
> .DETAILS
True attackers have a host of options when attempting to gain access to an internal network. While the most sophisticated have the resources to either research or buy 0-day exploits, the vast majority use social engineering to convince a victim to run malware on their host. Within penetration testing, these techniques are replicated and used to provide end user phishing training as well as to tune monitoring capabilities.
> .TECHNOLOGY
EMPIRE, KALI LINUX, MICROSOFT WORD MACRO, PHISHSCALE.XYZ