Find the vulnerability, remove the hacker from the system, restore access, increase the level of system security, collect evidence of hacking and eliminate the consequences of infrastructure hacking, test application source code testing, or assist in setting up new infrastructure.