Paula Januszkiewicz demonstrates quite clearly how to gain access to systems, decrypt passwords and exploit vulnerabilities.