In the world of software security, an attacker will almost always take the path of least resistance. Sophisticated exploits won’t