Developing the exploit