Understanding the Cyber Kill Chain Used by Hackers