VULNERABILITY HACKING