Figure 12.19
The Trojan horse dumps password
hashes and emails them across the Internet