Adversary Tactics: Vulnerability Research For Operators