A red team plans strategy for different attacks, collects intelligence on the target, analyzes the possibilities and then executes based on its findings. Having security knowledge or experience alone is not sufficient to making someone a red teamer. Adversaries don’t play by any rules. Attackers adapt and learn from their failures. A good red teamer then has to adapt and play by the same rules of the adversary, in other words: no rules.