This presentation aims to explore the attack process and shed light on the steps involved, highlighting the importance of proactive cybersecurity measures. By understanding a real-world example, we can gain valuable insights into how cyber attackers exploit vulnerabilities and the countermeasures that can be implemented to prevent and mitigate such attacks.