Modeling and Simulating Network Exploitations Using Simplified Exploitation Graphs