Table of contents Study Notes Preparing the Attack ✅ Social Engineering Attack Vectors ✅ Delivering a Triggerable Outlook Malware via Macros Custom Undetectable Macro Development Establishing A Shell Through The Victim's Browser Red Teaming Active Directory ✅ Reconnaissance & Enumeration Red Teaming Active Directory Red Teaming Critical Domain Infrastructure Red Teaming MS SQL Server ✅ Red Teaming Exchange ✅ Red Teaming WSUS Evasion Defense Evasion