They start to look for specified vulnerabilities within the Firm network which they will exploit for example apps, goal networks, and so forth., and start indicating/mapping out the parts wherever they can take advantage. The moment they properly identify which defenses are in position, they opt for which weapon is https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network