Figure 12.12  An attack against Monstrous Software to obtain Foobar source code