How Do Hackers Find Vulnerabilities