Identify Weaknesses and Attack Targets in the Windows Environment