brute force vulnerabilities and exploits