Exploitation Methods - Techniques used to identify, leverage, or manipulate vulnerabilities for various malicious or strategic purposes.