In Part 2, utilize the Metastasis Framework within Kali Linux to build a malicious office document that is frequently used to steal data via vectors of attack such as email. Analyze (2-3 pages double-spaced and including screenshots) how you plan on presenting this to users to collect these credentials.