First a security analysis of the network is made with the help of scanning tools and already known information so they can model the network in form of a finite state machine and specify desired security properties, which an attacker wants to exploit.