Post

Red Team

CTF

Web Application Testing
Injection
Script Input
Request Forgery
User Interaction
Authentication Bypass
Web Configuration

Blue Team

Threat Hunting / Endpoint Investigation

Digital Forensics

Network Traffic Inspection

Threat Intelligence

Malware Analysis