Crypto-attack runbooks¶ Step-by-step engagement runbooks for cryptographic attack scenarios. Runbooks Padding oracle exploitation TLS misconfiguration assessment Kerberoasting and AS-REP roasting JWT attack techniques RNG quality assessment