{"version":1,"pages":[{"id":"lmrxbQazVIlVDcM9f1NJ","title":"About RTG","pathname":"/","siteSpaceId":"sitesp_UQEYi","description":"","breadcrumbs":[{"label":"RTG"}]},{"id":"bv7N9yviIGdVyeZxN99U","title":"About the Author","pathname":"/rtg/about-the-author","siteSpaceId":"sitesp_UQEYi","description":"","breadcrumbs":[{"label":"RTG"}]},{"id":"mC2rJgArAZvfbM3mdwvW","title":"Launching Your Career in Ethical Hacking: A Comprehensive Step-by-Step Guide","pathname":"/rtg/launching-your-career-in-ethical-hacking-a-comprehensive-step-by-step-guide","siteSpaceId":"sitesp_UQEYi","breadcrumbs":[{"label":"RTG"}]},{"id":"JvAaSCf5jXItMMiGKSZ7","title":"Why Offensive Cyber Red Teaming","pathname":"/red-teaming-zone/why-offensive-cyber-red-teaming","siteSpaceId":"sitesp_UQEYi","breadcrumbs":[{"label":"RED TEAMING ZONE"}]},{"id":"jh8kbxC7ILmxqpVmvpBs","title":"Red Teaming Methodology","pathname":"/red-teaming-methodology","siteSpaceId":"sitesp_UQEYi"},{"id":"RF4I9MSw0TOf3ZdukMQb","title":"Recon for Red Teaming- Theory","pathname":"/recon-for-red-teaming-theory","siteSpaceId":"sitesp_UQEYi"},{"id":"D1oWoZNO8I4x2ksY1djY","title":"Recon for Red Teaming- Practical","pathname":"/recon-for-red-teaming-practical","siteSpaceId":"sitesp_UQEYi"},{"id":"lP8N74k6tl8wbRzU61n1","title":"OSINT for Red Teaming","pathname":"/osint-for-red-teaming","siteSpaceId":"sitesp_UQEYi"},{"id":"Oq3Lo70QnLaqEe85hpUb","title":"Reverse Shell 101","pathname":"/reverse-shell-101","siteSpaceId":"sitesp_UQEYi"},{"id":"Oul9w5Rbe6OAqhIZ64KF","title":"Windows Reverse Shell","pathname":"/reverse-shell-101/windows-reverse-shell","siteSpaceId":"sitesp_UQEYi","breadcrumbs":[{"label":"Reverse Shell 101"}]},{"id":"JrsErGLfqM7U2wuZfpem","title":"Reverse Shell References","pathname":"/reverse-shell-101/reverse-shell-references","siteSpaceId":"sitesp_UQEYi","breadcrumbs":[{"label":"Reverse Shell 101"}]},{"id":"cKju0E9DwvVFuzhuCDpa","title":"Lateral Movement 101","pathname":"/lateral-movement-101","siteSpaceId":"sitesp_UQEYi"},{"id":"T0wa2p9SYrtRCvr0RCnB","title":"Offensive PowerShell","pathname":"/offensive-powershell","siteSpaceId":"sitesp_UQEYi"},{"id":"MaqCxzEei4tsLCQJBPgd","title":"Offensive C Sharp (C#)","pathname":"/offensive-c-sharp-c","siteSpaceId":"sitesp_UQEYi","description":""},{"id":"PkjJY3BZZ3YeWsE01cl0","title":"Offensive WMI","pathname":"/offensive-wmi","siteSpaceId":"sitesp_UQEYi"},{"id":"atSDKttXoecHNhH6QYYS","title":"RDP login with NTLM Hash","pathname":"/rdp-login-with-ntlm-hash","siteSpaceId":"sitesp_UQEYi"},{"id":"SQRoVa6p47iQ0X9MtTco","title":"RDP as a Console","pathname":"/rdp-as-a-console","siteSpaceId":"sitesp_UQEYi"},{"id":"xPoiR4CHUBVMPKXUxX0I","title":"Bypassing Windows AppLocker","pathname":"/bypassing-windows-applocker","siteSpaceId":"sitesp_UQEYi"},{"id":"1F4BFwsdMuXj8888MAYY","title":"Attacking MSSQL","pathname":"/attacking-mssql","siteSpaceId":"sitesp_UQEYi"},{"id":"7Wn6G4NHnMdV5Vm1iCcn","title":"Backdoors","pathname":"/backdoors","siteSpaceId":"sitesp_UQEYi"},{"id":"MMZnbqQuWBqaiBhqsVVj","title":"Pivoting & Tunneling","pathname":"/pivoting-and-tunneling","siteSpaceId":"sitesp_UQEYi"},{"id":"INYDnSemCuqPCwgvF1Sk","title":"Cloud in Red Teaming","pathname":"/cloud-in-red-teaming","siteSpaceId":"sitesp_UQEYi"},{"id":"x4lCEFaVgILbkUEqkIqq","title":"Social Engineering in Red Teaming","pathname":"/social-engineering-in-red-teaming","siteSpaceId":"sitesp_UQEYi"}]}