Loading: 4 Steps Toward Knowing Your Exploitable Attack Surface