sorint.lab Summer's tale: Attackers have documented procedures too! A quick snoop into attacker's internal docs