Attack life cycle
include attack_white_noise
include attack_reconnaissance
include attack_infiltration
include attack_c2_communication
include attack_privilege_escalation
include attack_maintain_persistence
include attack_exfiltration
include attack_white_noise
include attack_reconnaissance
include attack_infiltration
include attack_c2_communication
include attack_privilege_escalation
include attack_maintain_persistence
include attack_exfiltration