Exploiting crypto vulnerabilities