Common cyber attack vectors and initial access methods