Step 2 – obtaining vulnerable systems