Target Discovery,2
Vulnerability Detection,3
Exploitation,6
Success,7