description So you want to know how adversaries/bad actors compromise our software? Red team A portal to the other side Go through the portal...