What you see is not a typical IT team. It's an offensive cell that has adopted the perspective and motivations of a real adversary. Our task is not to find as many vulnerabilities as possible, but to achieve a specific, defined business goal—such as stealing customer data or taking control of a production system.
We act with the determination and creativity of a real aggressor, using attack chains (kill chains) and tactics described in the MITRE ATT&CK® matrix.