The Cyber Kill Chain Explained With Real Examples