Find the Most Susceptible Attack Vectors which an Attack can be Carried Out