Fault injection attacks (FIAs) are a powerful tool for attacking embedded systems, especially bootloaders and cryptographic operations. However, the concrete effects a fault has on a particular program are difficult to predict. In this talk, we first recall the basics of FIAs and then use advanced simulation techniques to exhaustively inject every possible fault into an example program in a live demo. Tracing a few of the faults and looking at results from other simulations, we see how weird the effects can get and what generic approaches we can apply to become more resistant to FIA.