In: Where the falcons and foxes roam

A fox at the treeline, one paw raised, reading every gap in the fence at once. A phishing hook dangles from a branch above. A door stands open, held by a paper coffee cup. At the base of the wall, a burrow, unpatched and wide enough. The falcon is already circling. The prey has not looked up yet.

Welcome to the In phase, where attackers don’t knock, they pick the lock, clone the key, or just walk in behind someone carrying coffee. This is the falcon’s dive and the fox’s sneak, where initial access isn’t about brute force, but finesse. Phishing emails? Bait on a hook. Tailgating? A predator blending with the herd. And that unpatched server? An open burrow just begging to be claimed. The hunt begins here, where the only rule is: Don’t get caught before the feast.