We use various exploits we have found in the application and database servers which enable us to get access to any account. We use this method combined with a technique known as brute force.The system will process thousands of common password variations of keywords on their profile page.