This is a whitepaper that goes into detail on downloading configuration files and exploiting
That is all