This article describes one of my numerous external penetration testing travels and how I compromised the organization. I always debrief my client’s top management after doing security assessments (e.g. Penetration Testing, Red Teaming, etc.). This allows for discussion of attack tactics, techniques, and procedures (TTPs), attack vectors, results, recommendations, and…