DNS Remote Code Execution: Writing the Exploit 💣 (Part 2)