From: Survey of intrusion detection systems: techniques, datasets and challenges
Vectors | |
 TCP ports - Web-based vectors;  Browser attacks - Malware attachments. | |
Effects | |
 Effects - Bind Shell - Reverse shell - Exploitation  Remote operation - Staging - System manipulation  Privilege escalation - Data exfiltration -Back-door insertion |