Scoping Attacks By Following Attacker Breadcrumbs