Second in an excellent three-parter from Redteams.net on the process of Red Team operations –
“This is the 2nd part of a 3 part series that takes us through the process of planning, preparing and executing a security vulnerability assessment and a penetration test, bad-guys style”