Lifting the lid on the Redkit exploit kit (Part 1)