They start to search for selected vulnerabilities throughout the Corporation community which they can exploit like purposes, target networks, and many others., and start indicating/mapping out the parts the place they might make the most. When they correctly determine which defenses are in position, they pick which weapon is ideal https://ieeexplore.ieee.org/document/9941250