Here is the collection of videos of previous 4 articles.
These videos show in steps how the setup was attacked and vulnerabilities were exploited.

Video 1

Video 2

Video 3