Source enhancement: Will involve attackers obtaining or thieving methods to use them for the long term attack. three. Exploitation: Centered upon any details determined from the prior stage, the cybercriminals start an exploit against any weak spot present in the network process. They exploit making use of an exploit kit https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network