At which stage attacking the vulnerability belongs in Cyber kill chain?