Evaluate yourself

Reconnaissance
Delivery
Exploitation
Installation
Command and Control
Objective of Attack
Contact Details
Reconnaissance
Yes No Partial
Computer Name of the "Patient Zero" or the source of the Infection of the Cyber attack.
Operating System of the "Patient Zero" machine.
Vulnerable Applications/Vulnerabilities exploited by attacker to infect the "Patient Zero" Machine.
Logged-in User Name on the "Patient Zero" machine when the cyber attack/infection was injected on the "Patient Zero"
MAC Address of the "Patient Zero" machine.
Host IP Address(es) of the patient zero machine at the time of infection.