Target Discovery,2
Vulnerability Detection,3
Vulnerability Exploitation,7
Success,8