Investigating A Malware Exploit: A Complete Analysis Using Kali Linux