Exploit environment weaknesses, configuration mistakes and vulnerability patterns in scripts and systems.