Analyzing and Writing a Local Exploit