1
Zero Day
2
System Override
3
Binary Stream
4
Kernel Panic
5
Proxy Tunnel
6
Buffer Overflow
7
Encrypted Logic
8
Packet Sniffer
9
Firewall Breach
10
Cold Boot
11
Ssh Tunnel
12
Port Scan
13
Logic Bomb
14
Sql Injection
15
Dead Drop
16
Rootkit Embedded
17
Distributed Denial
18
Subnet Masking
19
Executable Payload
20
Mainframe Uplink
21
System Shutdown (Grand Finale)