Chapter 1: Red-Teaming and Pentesting