Adversary Tactics: Vulnerability Research for Operators