We simulate an skilled attacker trying to penetrate your network, by exploiting the weakest systems, to get access to sensitive information and steal all your coins.