A Methodology for Detecting and Classifying Rootkit Exploits