Steps that take place during an attack
The real attacker sends an “execute” message to the control master program.
The control master program receives the “execute” message and propagates the command to the attack daemons under its control.
Upon receiving the attack command, the attack daemons begin the attack on the victim.