EXPLORING THE MOST COMMON EXPLOITS FOUND IN PENETRATION TESTING