Attack Simulation: Deconstructing an Attack in a Containerized Application