How can a hacker finds exploits in my system