(I don't necessarily want an exploit; I just want to know if it's feasible in our various hosted and non-hosted environments)