Here, we will explore the methods used by an attacker to exploit and gain access or control of enterprise information systems.