Exploitation may be the stage that follows shipping and weaponization. During the exploitation step in the Cyber Kill Chain, attackers take advantage of the vulnerabilities they have got found in preceding levels to even further infiltrate a goal’s network and attain their aims. The faculty library Web-site is going to https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network