Part 1: Five Ways Attackers Leave Themselves Vulnerable to Detection