Preparing for Live Pwnage: Mitigation Bypass Bounty Machine Specs for Black Hat