Here I will focus on the 2 Major Techniques for Initial Access, in this section we can take in consideration SpearPhishing in the form of Attachments and Links. Some of the Techniques demonstrated in the Offensive Section we can see what is being used, and how it's being used these 2 well known techniques but what can we do about this, what is our Hunter seeing when searching for a Threat, what do we leave behind that gets us caught.