They begin to search for specified vulnerabilities inside the organization network which they can exploit including purposes, target networks, and so on., and start indicating/mapping out the parts where they can take advantage. After they effectively discover which defenses are in position, they pick out which weapon is very best https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network