If it's IT related, it can be exploited.
Rule 1337 includes, but is not limited to: Software Internet Commands Hardware Protocols Encryption