Inverse exploit