They start to look for specified vulnerabilities throughout the Group network which they are able to exploit including apps, goal networks, etc., and start indicating/mapping out the regions wherever they could take advantage. As soon as they productively determine which defenses are set up, they choose which weapon is ideal https://ieeexplore.ieee.org/document/9941250