In late 2019, I joined a rehearsal of cybersecurity called Red-Blue team which based on ‘attack and defense’ in real world, and I was Red. It took my Red-team a very short time to find out and exploit weaknesses of the victim’s systems. With a couple days trying to