Explain attacking mechanisms (e.g., step by step procedures or
phase by phase: Preparation, Initial Intrusion, Expansion,
Persistence, Search and Exfiltration, Cleanup) of GhostNet in
detail for a given real case (identified by yourself)
(Hints: You should focus on the procedures of the attacking
mechanism. Explain the following steps in detail: Preparation,
Initial Intrusion, Expansion, Persistence, Search and Exfiltration,
Cleanup)