Watch this video on YouTube
You need to exploit a Remote Code Execution vulnerability in a Windows server. What is the first step in preparing the attack?