Now that we are done gathering information about the target company, we will analyse all the information we gathered so far in this lecture, and try to come up with attack strategies to hack into this company.