How Do Attackers Exploit Attack Vectors