Techniques.md
1 **1. Description:** 2 3 **2. How it Works:** 4 5 **3. Use Cases in Cybersecurity:** 6 - **Offensive Security:** 7 - **Defensive Security:** 8 9 **4. Advantages and Disadvantages:** 10 - **Advantage:** 11 - **Disadvantage:** 12 13 **5. Countermeasures:** 14 - 15 16 **6. Examples:** 17 -