How do hackers find zero day exploits? What process is there for lo...