Network administrator touching EXPLOIT on an interactive screen. Business metaphor and information technology concept for software or commands taking advantage of program flaws and security holes.