Figure 12.20  The attackers crack the passwords
through three levels of indirection