
So phase two, you have covert entry and overt entry. Um for covert entry, for example, you have um the access card cloning, which we're also going to touch on today. Um covert means that you still under the radar. You're not talking to people. Um you try to get into the the premises without uh seeing anyone basically or talking to anyone. Uh the over entry for example, social engineering. Um yeah, that's where you make yourself known and you try to um trick people into basically letting you into the premises. And then phase three, once you're in there, you want to reach your objectives and sometimes you want to maintain access because it has happened before that we had to go in there multiple
times. Um, and that you do via hardware additions or you steal some documents or you try to steal uh badges they can use for the um batch cloning. Um, so who is who in the red