UNLOCKING IDM'S FULL POTENTIAL: A GUIDE TO CRACKING EXPLOITING