Step 3 plus
Example from the workbook step 3 plus (page 25).
Exploiting vulnerability: A