Figure 12.20
The attackers crack the passwords
through three levels of indirection