Exploit loopholes to perform the attack